Red Hat Research Quarterly
“It’s the wild frontier”: security, agentic AI, and open source
Luke Hinds, creator of Sigstore and open source startups including Stacklok and AgentUp, talks with Ryan Cook, platform and Enterprise AI lead in Red Hat Emerging Technologies.
Volume 7, Issue 2 • ISSN 2691-5278
Departments
Features
Inside this issue
Research collaborations between Red Hatters and key Red Hat industry and university partners often produce peer-reviewed publications that bring open source contributions along with them. These research artifacts illustrate the value that open industry-academia collaborations hold not just for participants, but for technological advancement across the field of computer engineering. This is a sampling of […]
Data silos, regulatory compliance, and resource consumption limit the collaboration needed to address real-world challenges. A global consortium is working to change that. Significant challenges have hindered the rapid integration of artificial intelligence (AI) in key industries that drive economic and social development such as agriculture, finance, and energy. Shared data can provide substantial efficiency […]
Enhancements to the education project highlight how research work on OPE drives advancements for many kinds of multitenant environments. The Open Education Project (OPE) continues to develop solutions for optimizing GPU resource usage in a multitenant environment. OPE, a project of Red Hat Collaboratory at Boston University, has long been a pioneer in making high-quality, […]
Improvements to the research-developed tool for analyzing unsafe Rust have rendered it much more precise. Yuga is a static software analysis tool for identifying lifetime annotation code defects in Rust code. At the time it was first presented in a previous article in the Red Hat Research Quarterly, Yuga’s analysis yielded an unacceptably high number […]
Collaborative research among industry, academia, open source communities, and government is proactively developing quantum-resistant solutions. The rise of large-scale quantum computers presents a direct threat to the cryptographic primitives that secure our most critical digital infrastructure. As these machines advance, they will be capable of breaking algorithms like RSA and ECC, which form the bedrock […]
In the film The Hunt for Red October, a Soviet submarine captain intends to defect to the United States with his state-of-the-art nuclear submarine, and he discusses plans with his senior officers while underway. “I will live in Montana,” one says, and I will marry a round American woman and raise rabbits, and she will […]
Engineers on the Mass Open Cloud are continually developing new capabilities for the research resource. Here’s how. For many people, “the cloud” is a very abstract entity. It’s a place to store their photos and data, and they don’t expect to have control over it beyond setting a password for access. In the world of […]
The name Luke Hinds is well known in the open source security community. During his time as Distinguished Engineer and Security Engineering Lead for the Office of the CTO Red Hat, he acted as a security advisor to multiple open source organizations, worked with MIT Lincoln Laboratory to build Keylime, and created Sigstore, a wildly […]




