So many organizations are jumping on the Microservices bandwagon. The amount of hype makes the phenomenon nearly impossible to ignore. According to InfoQ, Microservices and their respective frameworks are in the “Late Majority” stage, meaning that even those industries and enterprises which are slow to adopt new tech are using them. That said, many of those same organizations are struggling to attain the promises that have been espoused by companies like Google or Twitter around Microservices.
Continue reading “Achieving the promise of Microservices, one contract at a time”
We want to give you the opportunity to weigh-in on some exclusive new Red Hat Training content!
Continue reading “Impact the future of Red Hat Training Video Classroom”
Recently I passed the Red Hat Certified Specialist in Gluster Storage Administration exam. In this blog post, I would like to share some of my experience and exam tips with you.
Continue reading “Tips for passing the Red Hat Certified Specialist in Gluster Storage Administration exam”
I get asked all the time if I have any tips or advice on how to pass Red Hat exams. Because providing a fair and equal opportunity to all candidates is critical, I am usually reluctant to answer and refrain from handing out advice to individuals. However, since I get this question so often, I have decided that it is time to give some advice to everyone who is interested in taking a Red Hat exam.
Continue reading “Tips for passing Red Hat Certification exams”
Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.
Continue reading “Red Hat Training and Certification aims to increase peer-to-peer learning”
Originally posted on She ITs and Giggles blog.
Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.
Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”