Date: Thursday, August 1, 2013
Time: 16:00 UTC | 12:00 pm (New York) | 6:00 pm (Paris) | 9:30 pm (Mumbai)
Duration: 60 minutes
Your business analysts and application developers need to be on the same page to model, automate, measure, and improve their processes and policies. Miscommunication creates delays in delivery, increases costs, and compromises innovation.
Behavior-driven development (BDD) is an agile, customer-driven software development method that brings together subject matter experts, testers, and developers to improve the speed-to-market and quality of rules-based applications.
Cigna increased productivity and quality with BDD
In this webinar, Red Hat Consulting gives and overview of the BDD method, and Cigna, a global health service company, discusses how adopting BDD helped them transform their DevOps practice by:
Continue reading “WEBINAR: How Cigna builds better applications, quicker with agile testing”
by Randy Russell (Red Hat)
I am pleased to announce our newest certification, Red Hat Certificate of Expertise in Server Hardening. This new Certificate of Expertise will take the place of the Red Hat Certificate of Expertise in Security: Network Services and Red Hat Certificate of Expertise in Directory Services and Authentication. Red Hat Certified Professionals working towards earning Red Hat Certified Security Specialist (RHCSS), Red Hat Certified Datacenter Specialist (RHCDS) or Red Hat Certified Architect are able to visit our Certification FAQ to learn more about how this new Certificate of Expertise fits into these programs. Why are we introducing this new credential and replacing long-standing ones with it?
Every year, Las Vegas plays host to DEF CON® Hacking Conference, which is routinely described as the world’s biggest hacker conference. Most people attend to learn about security exploits so that they can protect themselves and others. At last year’s conference many speakers within the DEF CON community spoke about the important of asking questions, engaging with others while at the conference and sharing knowledge.
One speaker, who is particular well-established, likewise made such a statement. He then went on to say that in order to speak to him, there were requirements. He then proceeded to enumerate, accompanied by slides, the vast array of skills and knowledge one needed in order to be worthy to step into his presence. His rigorous list would be an excellent checklist for someone who wanted to have a heavy-duty, information assurance consulting practice. However, many of us must think about security and implement practices that address specific risk factors with appropriate levels of time, effort and money. It is not our role to contemplate the vast everythingness of everything. We need to ensure that we have taken appropriate steps on systems within our care. In short, we need focus within that deep, broad ocean called security.
Continue reading “Announcing the Red Hat Certificate of Expertise in Server Hardening”
by Mike Randall (Red Hat)
Below are links to some pages and articles we found this week and really liked.
Check out the latest Guaranteed-to-run course schedule, RedHat
Red Hat Training EMEA summer promotion, Red Hat
Java enterprise application migration: the four pillars of success, ServicesSpeak
Cigna named 2013 Red Hat Innovator of the Year, InvestorsBusinessDaily
Red Hat makes OpenStack, open hybrid cloud push official, VARGuy
Red Hat advances OpenShift enterprise with new release, SysCon
Red Hat on RHEL7, MariaDB and enterprise Linux, ServerWatch
OpenStack marks third birthday, ZDNet
Red Hat’s cloud strategy centers on bundled products and top-notch support, LinuxToday
Can Red Hat hijack OpenStack (in a good way)?, VARGuy
Continue reading “Our favorite links and pages of the week”
by Brad Davis (Red Hat)
With the release of Red Hat JBoss Enterprise Application Platform 6, Red Hat successfully delivered a full JEE 6-compliant container that is both lightweight and enterprise ready. As a result, many IT leaders are actively looking to shift their application workloads away from proprietary technologies like Websphere and Weblogic to JBoss EAP.
But questions about cost, risk and starting point often stand in the way.
In response, Red Hat Consulting has developed a proven methodology, identifying four key pillars to a successful migration. Leveraging Planning, Participation, Communication, and Follow through, more and more customers are easily migrating from legacy platforms to JBoss EAP.
The Planning pillar analyzes an organization’s proprietary applications and processes. This stage elicits an understanding of the application environment, as Red Hat’s JBoss Windup tooling quickly scans applications to find and estimate migration effort for each application. Data from the Windup report allows us to group applications together and to plan for optimized parallel or repeatable migrations where appropriate. Those critical to the migration’s success from a business, development and operational standpoint are also consulted to best understand the skill sets, procedures, and timelines needed to support development, architecture, deployment, maintenance and monitoring tasks.
Continue reading “Java enterprise application migration: The four pillars of success”
We’ve somehow already reached the halfway point of the calendar year. Since Halloween decorations will be out before you know it, we thought it would be a good idea to look back at our most popular posts from the first six months of the year, just in case you missed something. Have something in mind you want to read about during the second half of the year? Want to contribute? Please let us know.
Continue reading “The best of 2013, so far”
by Satish Irrinki (Red Hat)
Increasingly in today’s world, data centers are moving towards software-defined computing, networking, and storage. IT infrastructure that supports the application and data workloads is moving from bare metal servers to cloud. While the most obvious justification for this shift can be summarized as increased efficiency, capacity utilization, and flexibility (to scale up or down), there are less obvious fundamental economic and financial principles in play that contribute to overall business stability of the organizations and lines of business (LOB).
Cloud computing has changed the cost structure of IT infrastructure. Historically, IT infrastructure was considered a capital expenditure (CapEx) that requires large upfront investments leading to higher fixed costs for the business. With the advent of cloud computing, primarily because of its pay-for-use billing model, IT expenditure shifted from fixed operating cost structure to variable operating cost (OpEx) model.
This shift not only decreases the need for larger cash flow requirements or, in lieu, higher liabilities on balance sheet (akin to capitalization of lease expenses) for the CapEx, it also reduces the volatility in the operating income for the business.
Continue reading “Cloud Adoption for Enhanced Business Stability”