CIQ Blog

What’s new at CIQ?

We’re a team of scientists, Linux geeks, technologists, pilots, designers and more with a mission to make infrastructure something you never have to think about.

View allThe CIQ TeamRocky LinuxFuzzballWarewulfAscender Pro
Own your Enterprise Linux upgrade timeline with RLC Pro

Own your Enterprise Linux upgrade timeline with RLC Pro

Every six months, the upstream Enterprise Linux community ships a new minor release and retires the previous one. Your team's upgrade calendar resets: regression testing, application re-validation…

Mar 4, 2026RLC Pro
CentOS Connect / FOSDEM trip report

CentOS Connect / FOSDEM trip report

Waffles, fries, and beer! Can you guess where we were last week? That’s right. We were in the wonderful city of Brussels, Belgium. We were there for more than just the food and beverages. We were…

Mar 3, 2026The CIQ Team
Debugging and troubleshooting Ansible playbooks

Debugging and troubleshooting Ansible playbooks

The error says "line 11, column 5" but line 11 looks fine. Sound familiar? Ansible error messages can be cryptic. A missing space breaks everything. A typo in a variable name fails silently until…

Mar 2, 2026Ascender Pro
CIQ launches RLC Pro: redefining the Enterprise Linux standard

CIQ launches RLC Pro: redefining the Enterprise Linux standard

RLC Pro unifies open source availability and enterprise capabilities in one solution, eliminating infrastructure fragmentation. A foundation built for modern infrastructure, with variants purpose…

Feb 26, 2026Rocky Linux
Achieving idempotency with shell commands

Achieving idempotency with shell commands

Introduction Ansible is powerful, but mastering it at enterprise scale requires understanding key concepts that aren't always straightforward, and having the right platform to implement them reliably…

Feb 19, 2026Ascender Pro
Weekly newsletter

No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Read about our privacy policy.

Preparing your infrastructure for post-quantum cryptography

Preparing your infrastructure for post-quantum cryptography

Your security team is asking about post-quantum cryptography (PQC). Your auditors are asking about PQC. Your customers are asking about PQC. And when you go looking for FIPS-validated post-quantum…

Feb 4, 2026Rocky Linux
Rocky Linux from CIQ bootable container images now available

Rocky Linux from CIQ bootable container images now available

Rocky Linux from CIQ (RLC) now ships as bootable container images, letting organizations deploy and manage their Linux infrastructure using the same container workflows they use for applications…

Feb 3, 2026Rocky Linux
Fuzzball adds preview support for CoreWeave provisioning

Fuzzball adds preview support for CoreWeave provisioning

The next version of Fuzzball includes preview support for the AI-focused cloud computing platform CoreWeave, making CoreWeave the second cloud environment and first “neo-cloud” that can be natively…

Jan 30, 2026Fuzzball
The zero-day gap: why patching alone leaves Linux systems exposed

The zero-day gap: why patching alone leaves Linux systems exposed

A new kernel CVE drops on Friday afternoon. Your security team flags it as critical. Exploit code is already circulating on GitHub. Your patch cycle is 30 days. What happens in that gap? For most…

Jan 29, 2026rlc-h
Running Jupyter notebooks on HPC clusters without SSH tunneling

Running Jupyter notebooks on HPC clusters without SSH tunneling

Every HPC center has the same support ticket: "How do I run Jupyter on the cluster?" The answer usually involves SSH tunneling, port forwarding, and a series of steps that look something like this…

Jan 27, 2026Fuzzball
Reactive vs. proactive security: why your Linux infrastructure needs both

Reactive vs. proactive security: why your Linux infrastructure needs both

The reactive security model Most enterprise security operates on a straightforward cycle: detect threats, respond to incidents, patch vulnerabilities, repeat. This model has served organizations well…

Jan 22, 2026rlc-h
CVE management: automate discovery to remediation

CVE management: automate discovery to remediation

When your security team asks, "Are we vulnerable to CVE-2026-XXXX?" the answer needs to come in minutes, not hours. With over 100 new CVEs published daily—and some days exceeding 1,000—manual…

Jan 20, 2026Ascender Pro
123
25
>>>