[Video] Building my lab: Setting up FreeNAS

Building my lab: Figuring out what to build

Achieving the promise of Microservices, one contract at a time

So many organizations are jumping on the Microservices bandwagon. The amount of hype makes the phenomenon nearly impossible to ignore. According to InfoQ, Microservices and their respective frameworks are in the “Late Majority” stage, meaning that even those industries and enterprises which are slow to adopt new tech are using them. That said, many of those same organizations are struggling to attain the promises that have been espoused by companies like Google or Twitter around Microservices.

Continue reading “Achieving the promise of Microservices, one contract at a time”

Tips for passing Red Hat Certification exams

I get asked all the time if I have any tips or advice on how to pass Red Hat exams. Because providing a fair and equal opportunity to all candidates is critical, I am usually reluctant to answer and refrain from handing out advice to individuals. However, since I get this question so often, I have decided that it is time to give some advice to everyone who is interested in taking a Red Hat exam.

Continue reading “Tips for passing Red Hat Certification exams”

Red Hat Training and Certification aims to increase peer-to-peer learning

Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.

Continue reading “Red Hat Training and Certification aims to increase peer-to-peer learning”

PAM – Pluggable Authentication Modules for Linux and how to edit the defaults

Originally posted on She ITs and Giggles blog.

Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.

Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”