Recently I passed the Red Hat Certified Specialist in Gluster Storage Administration exam. In this blog post, I would like to share some of my experience and exam tips with you.
Continue reading “Tips for passing the Red Hat Certified Specialist in Gluster Storage Administration exam”
I get asked all the time if I have any tips or advice on how to pass Red Hat exams. Because providing a fair and equal opportunity to all candidates is critical, I am usually reluctant to answer and refrain from handing out advice to individuals. However, since I get this question so often, I have decided that it is time to give some advice to everyone who is interested in taking a Red Hat exam.
Continue reading “Tips for passing Red Hat Certification exams”
Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.
Continue reading “Red Hat Training and Certification aims to increase peer-to-peer learning”
Originally posted on She ITs and Giggles blog.
Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.
Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”
Red Hat Certified Architect is the highest level of certification Red Hat offers. We are making some changes to the program and the way that we position it to help IT organizations and professionals worldwide better understand the program and what it means to be an RHCA.
For years, in order to earn RHCA you first had to earn Red Hat Certified Engineer (RHCE.) As the Red Hat product portfolio expanded into middleware, we expanded the program to provide a path to RHCA for developers who have earned either Red Hat Certified Enterprise Microservices Developer (RHCEMD) or Red Hat Certified JBoss Developer (RHCJD.)
Continue reading “Red Hat Certified Architect program changes”
With the June 2018 release of Red Hat OpenStack® Platform 13, you can build an on-premise cloud environment designed to accelerate your business, innovate faster, and empower your IT teams. This version of Red Hat OpenStack Platform specifically integrates OpenShift-Ansible, easing troubleshooting and deployment. Additional features include safeguarding enterprise workloads with hardened security services, helping your organization meet relevant technical and operational controls, delivering new telecommunications-specific features that allow CSPs to easily build innovative and cloud-based network infrastructure, and much more.
Continue reading “Now available on OpenStack 13 – Red Hat OpenStack Administration I: Core Operations for Cloud Operators (CL110)”
The Red Hat Training and Certification team has been busy preparing for Red Hat Summit. We hope that you will plan to join us for as many of the training and certification activities as possible! The team will be located in the Customer Success Zone at the Moscone West 2nd floor lobby. Here are a few activities that we wanted to highlight so you can put them on your schedule:
Continue reading “How to Engage with Training and Certification at Red Summit 2018”
Remote Execution is a very useful feature of Satellite 6. This long anticipated feature made its first appearance in version 6.2. Much has changed since the days of Remote Command in Satellite 5. Most significantly Remote Execution relies on ssh, instead of a client side daemon. This change introduces some new security considerations for hardened environments. Let’s take a closer look.
Continue reading “Securing Remote Execution”