Free Workshop – Deploying Ansible and Red Hat OpenShift & Containers

Due to many requests from our previous workshop, Info Trek is organizing yet another Red Hat workshop this coming May 2018.

 Date : 11 May 2018, Friday Venue: Info Trek, Amcorp Mall

This workshop will be covering how this powerful platform can help to simplify your complex areas in your IT Infrastructure. This is a full day hands-on workshop and live demo will be demonstrated by our speaker as well. In this interactive session, you will go through how Red Hat Ansible, OpenShift and Containers works and learn how it apply to relevant use cases.

Deploying apps shouldn’t be so hard. Ansible is the simplest way to deploy your applications. It gives you the power to deploy multi-tier applications reliably and consistently, all from one common framework. You can configure needed services as well as push application artifacts from one common system. Continue reading “Free Workshop – Deploying Ansible and Red Hat OpenShift & Containers”

Making old applications new again

Periods of gradual improvement in hardware, language, infrastructure, and methodology are punctuated by paradigm-shifting innovation. This evolution has allowed IT to stay ahead of ever-changing business demands, but it has not been easy or cheap.

In this whitepaper, Red Hat takes a look at three specific software development patterns to modernize existing applications. These modernization patterns address transitioning existing applications to more modern architectures and infrastructure and making them accessible to new applications. This paper also examines the conditions that lead to rewriting when that is the only option. These patterns help enterprises figure out how to get the most out of existing applications and establish a practice for continuous modernization that will serve the business now and in the future.

Download the whitepaper here.

Five pillars for security resiliency

IT environments are growing more sophisticated and complex—and thus more difficult to defend.
And so agencies must build their security on a resilient foundation that can meet their current
security needs while also expanding their digital capabilities.

In our work helping federal organizations secure their digital environments, Red Hat has identified five security “pillars” that are essential for building a resilient organization. Each pillar addresses key areas of concern for agencies operating in traditional IT environments, as well as for those who are moving aggressively to adopt cloud, mobile, and other advanced technologies.
These pillars also help federal organizations comply with strict government security requirements.

The five pillars for security and resiliency are:

  • Secure multitenancy provides secure, role-based access for multiple levels of security clearance, while also protecting data in multitenant cloud environments.
  • Identity management ensures only authorized users can access data and applications.
  • Continuous monitoring automates processes for compliance with security rules and requirements.
  • Collection and analysis implements robust security analytics with efficient, scalable data storage and analysis.
  • Secure software supply chain automates processes for ensuring the integrity of software.

Check out the whitepaper here.

Red Hat Learning Subscription

Red Hat Learning Subscription

Red Hat® Learning Subscription delivers access to Red Hat online training resources in a single, annual subscription.

Watch videos, take courses, and complete hands-on labs online, at your own pace. Customize your learning experience to access online training classes, certification exams, or video courses by choosing your subscription tier.

How to Solve Your Training Challenges

Increase Productivity – Train on your schedule, without the need for travel or lengthy time away from daily work.

Train and Certify at All Levels – Access popular video classroom courses and all Red Hat Online Learning courses to promote learning at any skill level.

Learn Continuously – Get immediate access to the latest course releases and updates. Track your learning progress on an easy-to-use interface.

Validate and improve skills – Retain successful teams and stay competitive with effective, in-depth training and hands-on, comprehensive certification exams that verify your skills.

Reduce risk –Train before implementing new technologies. Explore Red Hat products and solutions to try before you buy.

Invest smarter – Access unlimited training at a fraction of the cost of individual courses. With a five-to-one ROI, our training will help you achieve your business goals.

Benefits of Red Hat Learning Subscriptions

Continue reading “Red Hat Learning Subscription”

Red Hat – Deploying a highly available Openstack Cloud

65% of cloud adopters say OpenStack is important to their cloud strategy.

Communications service providers (CSPs) are embracing cloud technologies, such as OpenStack®, to meet demands for innovative new services. To ensure business continuity, these production cloud environments must be highly available and reliable. By considering the availability of both the components and topology of your cloud environment, you can build a highly available, production-grade OpenStack infrastructure.

The second in a series from Red Hat® Consulting, this whitepaper examines the resiliency of cloud architectures and provides detailed best practices for setting up and configuring a highly available OpenStack deployment.

This whitepaper provides tips and tricks for highly available deployment of the Juno release of OpenStack. It is part of a series from Red Hat Consulting that examines considerations for OpenStack deployment.

Check out the whitepaper here.