A developer’s guide to PyTorch, containers, and NVIDIA – Solving the puzzle| Red Hat Emerging Technologies
Starting about 5 years ago, I began moving to container-based operating systems (OS). It started with Bazzite and most recently I have been using Aurora. What’s not to love? These OS’s make containers first-class citizens, simplifying how to “install” and run applications, making experimentation and cleanup easy, and letting you use the great work of […]| Red Hat Emerging Technologies
Triton's caching mechanism: how it works, what affects it, how different frameworks leverage it, and how you can optimize it for your specific workloads.| Red Hat Emerging Technologies
What is the Sigstore model transparency project? Sigstore’s Model Transparency project is a Sigstore community project aimed at applying the software supply chain security practice of signing to machine learning (ML) models. Hosted on Github at sigstore/model-transparency, this project leverages Sigstore’s concepts, infrastructure, and tooling to sign ML models, helping to verify tamper resistance after […] The post Model authenticity and transparency with Sigstore appeared first on Red...| Red Hat Emerging Technologies
In a prior blog post, we provided an overview of the Triton language and its ecosystem. Triton is a Python based DSL (Domain Specific Language), compiler and related tooling designed for writing efficient GPU kernels in a hardware-agnostic manner, offering high-level abstractions while enabling low-level performance optimization for AI and HPC workloads. In this post, […] The post Getting started with PyTorch and Triton on AMD GPUs using the Red Hat Universal Base Image appeared first on Re...| Red Hat Emerging Technologies
“An intuitive and accessible UI is critical to even the most powerful AI system“ As artificial intelligence (AI) continues to evolve, its influence spans across industries, transforming operations and enhancing decision-making processes. At this point in time, I believe most of us can envision that in the near future, AI will be as much a […] The post User experience and its importance in adoption of democratized AI appeared first on Red Hat Emerging Technologies.| Red Hat Emerging Technologies
It’s an exciting time to be involved in open source. Linux powers the world’s most critical devices, a story to which Red Hat has always been a champion. Today we look further afield. We look to a world of not what “is” but what “could be”. It’s informed by the path we’ve walked and the […] The post Software-defined processors: the promise of RISC-V appeared first on Red Hat Emerging Technologies.| Red Hat Emerging Technologies
Zero trust is becoming a norm as organizations look to enhance the security posture of their workloads in cloud environments. A core principle of the zero trust approach is the ability to prove and verify identity for all – whether these entities are inside or outside the organization’s security perimeter. This necessitates solutions that ensure […] The post SPIFFE/SPIRE on Red Hat OpenShift appeared first on Red Hat Emerging Technologies.| Red Hat Emerging Technologies
The Triton project from OpenAI is at the forefront of a groundbreaking movement to democratize AI accelerators and GPU kernel programming. It provides a powerful and flexible framework for writing high performance GPU kernels. As AI workloads become increasingly complex, developers need efficient, scalable and reproducible development environments to build and optimize models quickly. A […]| Red Hat Emerging Technologies
It’s almost impossible to count the number of security breaches that were caused by a leaked password or API key. Secret management in software is a tricky thing to get right. Securely deploying secrets to only the places where they are needed, securely rotating them to reduce exposure but also maintain system uptime, revoking compromised […]| Red Hat Emerging Technologies
Red Hat’s Emerging Technologies blog includes posts that discuss technologies that are under active development in upstream open source communities and at Red Hat. We believe in sharing early and often the things we’re working on, but we want to note that unless otherwise stated the technologies and how-tos shared here aren’t part of supported […]| Red Hat Emerging Technologies
The release of Kubernetes 1.24 includes signed images, which highlights the importance of delivering secure images. Whether container images are being distributed to customers or run within your own datacenters, you must ensure that the assets within the software have not been compromised. The following steps walk through the process of building and signing an […]| Red Hat Emerging Technologies