Red Hat takes wraps off RHEL 5.9
New Microsoft Hyper-V drivers in this updated Linux distribution offer improved performance in multivendor environments.
Though the software maintains backwards compatibility with hardware and software platforms across the RHEL 5 life cycle, it also brings several key new features to the table.
Ready for a rundown? Here are some of the most notable new features in this latest release.
1. Microsoft Hyper-V drivers
Perhaps first and foremost for companies with multivendor environments are new Microsoft Hyper-V drivers included in RHEL 5.9. "This enhances the usability of Red Hat Enterprise Linux 5 for guests in heterogeneous, multivendor virtualized environments and provides improved flexibility and interoperability for enterprises," the company explains.
2. Heightened security
Also part of the new update are tighter security controls and the ability to verify and check the robustness of new passwords. In addition, RHEL 5.9 includes support for the latest government password policy requirements as well as for using Federal Information Processing Standard (FIPS) mode with dmraid root devices. "FIPS mode now supports RAID device discovery, RAID set activation, and the creation, removal, rebuilding, and displaying of properties," Red Hat says.
3. Wider hardware support
With RHEL 5.9, Red Hat's software gains support for some of the latest CPU, chipset, and device driver enhancements, the company says.
4. Easier subscription management
Meanwhile, Red Hat Subscription Management comes by default in RHEL 5.9, allowing users to manage their RHEL subscriptions more easily.
Among other updates in the new software are developer tools including the ability to develop and test with the latest version of open source Java available through OpenJDK 7; a new rsyslog5 system logging package; and an update to Samba 3.6, which offers SMB2 support, a reworked print server, and security default improvements for all versions.
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- QA Automation: Reducing Test Execution While Improving Coverage A leading capital investment firm in the US was in need of a comprehensive, cost effective and flexible solution to reduce their existing...
- Turning Insight Into Action: Social Media Intelligence The amount of data produced on social media is staggering - and so is the potential business value for enterprises that know what...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- Protecting Critical SaaS Data Before It's Too Late In this webinar, you'll hear how to avoid SaaS data loss through best practices from a panel of experts.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel... All Operating Systems White Papers | Webcasts