Tips for passing Red Hat Certification exams

I get asked all the time if I have any tips or advice on how to pass Red Hat exams. Because providing a fair and equal opportunity to all candidates is critical, I am usually reluctant to answer and refrain from handing out advice to individuals. However, since I get this question so often, I have decided that it is time to give some advice to everyone who interested in taking a Red Hat exam.

Continue reading “Tips for passing Red Hat Certification exams”

Red Hat Training and Certification aims to increase peer-to-peer learning

Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.

Continue reading “Red Hat Training and Certification aims to increase peer-to-peer learning”

Red Hat and edX.org continue partnership with release of Fundamentals of Java EE Development course

We are excited to announce the release of a new Red Hat course on edX, the massively open online course platform founded by MIT and Harvard. The latest course, an introduction to Java EE using Red Hat JBoss Developer Studio and Red Hat JBoss Enterprise Application Platform, is available free of charge to anyone signed up on the edX community at edX.org.

Continue reading “Red Hat and edX.org continue partnership with release of Fundamentals of Java EE Development course”

Close out the year with a taste of Red Hat Training

Throughout the year, Red Hat Training and Certification delivers free monthly webinars based on our course materials to give a taste of Red Hat technologies and what our courses will cover. Missed the live sessions? Good news! These webinars are still available on-demand from 2018 and are available for 1 year from the live webinar date.

Continue reading “Close out the year with a taste of Red Hat Training”

OpenShift Container Platform Monitoring managed with Infrastructure-as-Code (IaC)

Monitoring of application environments is very important, and there are many kinds of monitoring to consider – infrastructure capacity and availability, as well as application responsiveness and availability to name a few. This is also true in a Platform-as-a-Service (PaaS) environment, such as one running the Red Hat OpenShift Container Platform. The use of containers mean that applications can be built as an immutable image that is deployed and promoted to multiple hosting environments at a rapid pace. This makes monitoring more complex, and the need for dynamic adaptation to the running environment is key to success. But what is the best way to deploy and manage the monitoring solution itself, which in many cases is also running fully or partially within containers? This is where Infrastructure-as-Code (IaC) comes in a useful approach. First, let’s define IaC.

Continue reading “OpenShift Container Platform Monitoring managed with Infrastructure-as-Code (IaC)”

2018 Red Hat EMEA Training Partner Conference Recap & Award Winners

The Red Hat EMEA Training Team hosted the 2018 Training Partner Conference in Prague on September 20-23, 2018. Over the course of the three days, 169 EMEA training partners, resellers, Red Hat Academy partners and instructors gathered for keynote and break-out sessions held by global and regional leaders, fellow partners and regional sales and Solution Architect specialist.

Continue reading “2018 Red Hat EMEA Training Partner Conference Recap & Award Winners”

PAM – Pluggable Authentication Modules for Linux and how to edit the defaults

Originally posted on She ITs and Giggles blog.

Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.

Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”