Security technical implementation guides (STIGs) provide a standardized set of security protocols for practically any system. From networks to servers and computers, STIGs are designed to enhance overall security and reduce vulnerabilities. But what happens when the guidelines vary across an enterprise? How do you apply these to a specific product without breaking it? Challenge accepted.
Red Hat held a series of Red Hat Academy Day events at 30 Red Hat Academies in India. This effort was the first Red Hat Academy road-tour to be conducted globally. During these events Red Hat Academy representatives conducted a celebration for 30 Red Hat Academies and over 5,560 students who have participated in the Red Hat Academy program.
I get asked all the time if I have any tips or advice on how to pass Red Hat exams. Because providing a fair and equal opportunity to all candidates is critical, I am usually reluctant to answer and refrain from handing out advice to individuals. However, since I get this question so often, I have decided that it is time to give some advice to everyone who is interested in taking a Red Hat exam.
Digital transformation is not only changing the way businesses operate, but how they approach learning as well. Digital change has made continuous learning more important, putting pressure on employers to stay focused on employee learning or risk falling behind. But at the same time, digital transformation has made learning much more accessible. There is more training available online, on-demand than ever before. In today’s digital world, much can be learned without ever stepping foot into a traditional classroom.
We are excited to announce the release of a new Red Hat course on edX, the massively open online course platform founded by MIT and Harvard. The latest course, an introduction to Java EE using Red Hat JBoss Developer Studio and Red Hat JBoss Enterprise Application Platform, is available free of charge to anyone signed up on the edX community at edX.org.
Throughout the year, Red Hat Training and Certification delivers free monthly webinars based on our course materials to give a taste of Red Hat technologies and what our courses will cover. Missed the live sessions? Good news! These webinars are still available on-demand from 2018 and are available for 1 year from the live webinar date.
Monitoring of application environments is very important, and there are many kinds of monitoring to consider – infrastructure capacity and availability, as well as application responsiveness and availability to name a few. This is also true in a Platform-as-a-Service (PaaS) environment, such as one running the Red Hat OpenShift Container Platform. The use of containers mean that applications can be built as an immutable image that is deployed and promoted to multiple hosting environments at a rapid pace. This makes monitoring more complex, and the need for dynamic adaptation to the running environment is key to success. But what is the best way to deploy and manage the monitoring solution itself, which in many cases is also running fully or partially within containers? This is where Infrastructure-as-Code (IaC) comes in a useful approach. First, let’s define IaC.