Automation within enterprise IT is not a new topic. Whether it’s automating the creation of a user desktop or a server, the drive has always been to automate as much as possible to achieve faster time to market and efficiency. What has changed, though, is the number of infrastructure elements one can automate within an IT org. I still remember my first job in college 15 years ago where I used a variety of tools to automatically deploy and configure Windows XP simultaneously across 50 desktop machines for a classroom lab environment. Today not only can we automate desktop computer deployments but also servers, applications, and even networking.
Continue reading “4 ways to jump start an Open Source & Agile Automation Culture”
Like many others in the technology industry, I share a passion for artificial intelligence (AI). This year at OpenStack Summit in Berlin, I presented a talk around parallel AI training. OpenStack lends itself well to big data problems.
Continue reading “Welcome to the AI Thunderdome: Using OpenStack to accelerate AI training with Sahara, Spark, and Swift”
Security technical implementation guides (STIGs) provide a standardized set of security protocols for practically any system. From networks to servers and computers, STIGs are designed to enhance overall security and reduce vulnerabilities. But what happens when the guidelines vary across an enterprise? How do you apply these to a specific product without breaking it? Challenge accepted.
Continue reading “Steps for testing DISA STIG controls against Satellite 6”
Originally posted on She ITs and Giggles blog.
Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.
Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”
Hello, my name is Christopher Tate and I want to show you how to set up virtualization and a virtual machine for DNS and Identity Management to open our OpenShift web console and routes to the network.
In my previous videos, I showed you how to install OpenShift with valid SSL certificates.
Hey Tate: Step by step securing OpenShift and routes with SSL certificates for development.
Continue reading “Hey Tate: Libvirt Virtualization and running ipa-server for DNS to resolve Openshift routes on the network”
I created this series of videos to show how to first, purchase a domain name for cheap, to use for valid SSL certificates and URLs for all your applications. I do this for learning and developing applications, not just for deploying to production. Then I show how to generate a free SSL certificate for secure, verified https connections to your sites. Then I show you how to run OpenShift locally, from the ground up, with SSL certificates for the web console, and all routes.
Continue reading “Hey Tate: Step by step securing OpenShift and routes with SSL certificates for development”
A collaboration blog with Dynatrace & Red Hat Open Innovation Labs
Summer kicked off for Dynatrace in the Boston seaport district this year, spending time with our partner Red Hat at Red Hat Open Innovation Labs. We learned that digital transformation is not just about technology, it’s about changing the culture in which you do business and striving for innovation.
Continue reading “Summertime and the livin is … all about innovation”