Like many others in the technology industry, I share a passion for artificial intelligence (AI). This year at OpenStack Summit in Berlin, I presented a talk around parallel AI training. OpenStack lends itself well to big data problems.
Continue reading “Welcome to the AI Thunderdome: Using OpenStack to accelerate AI training with Sahara, Spark, and Swift”
Security technical implementation guides (STIGs) provide a standardized set of security protocols for practically any system. From networks to servers and computers, STIGs are designed to enhance overall security and reduce vulnerabilities. But what happens when the guidelines vary across an enterprise? How do you apply these to a specific product without breaking it? Challenge accepted.
Continue reading “Steps for testing DISA STIG controls against Satellite 6”
Red Hat held a series of Red Hat Academy Day events at 30 Red Hat Academies in India. This effort was the first Red Hat Academy road-tour to be conducted globally. During these events Red Hat Academy representatives conducted a celebration for 30 Red Hat Academies and over 5,560 students who have participated in the Red Hat Academy program.
Continue reading “Red Hat launches Red Hat Academy Day events”
Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.
Continue reading “Red Hat Training and Certification aims to increase peer-to-peer learning”
What APIs that you create,
do you want to start making money?
Continue reading “Hey Tate: 3scale API Management built to scale on OpenShift”
Monitoring of application environments is very important, and there are many kinds of monitoring to consider – infrastructure capacity and availability, as well as application responsiveness and availability to name a few. This is also true in a Platform-as-a-Service (PaaS) environment, such as one running the Red Hat OpenShift Container Platform. The use of containers mean that applications can be built as an immutable image that is deployed and promoted to multiple hosting environments at a rapid pace. This makes monitoring more complex, and the need for dynamic adaptation to the running environment is key to success. But what is the best way to deploy and manage the monitoring solution itself, which in many cases is also running fully or partially within containers? This is where Infrastructure-as-Code (IaC) comes in a useful approach. First, let’s define IaC.
Continue reading “OpenShift Container Platform Monitoring managed with Infrastructure-as-Code (IaC)”
Originally posted on She ITs and Giggles blog.
Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.
Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”
Hello, my name is Christopher Tate and I want to show you how to set up virtualization and a virtual machine for DNS and Identity Management to open our OpenShift web console and routes to the network.
In my previous videos, I showed you how to install OpenShift with valid SSL certificates.
Hey Tate: Step by step securing OpenShift and routes with SSL certificates for development.
Continue reading “Hey Tate: Libvirt Virtualization and running ipa-server for DNS to resolve Openshift routes on the network”