Über Ihr Red Hat Konto können Sie auf Ihr Benutzerprofil, Ihre Einstellungen und die folgenden Services abhängig von Ihrem Kundenstatus zugreifen:
Noch nicht registriert? Folgende Gründe sprechen dafür, dass Sie es sein sollten:
- Greifen Sie auf Artikel in unserer Knowledgebase zu, verwalten Sie Ihre Supportfälle und Subskriptionen, laden Sie Updates herunter, und nutzen Sie viele weitere Funktionen über eine zentrale Schnittstelle.
- Lassen Sie sich die Benutzer aus Ihrem Unternehmen anzeigen, und bearbeiten Sie deren Kontoinformationen, Einstellungen und Berechtigungen.
- Verwalten Sie Ihre Red Hat Zertifizierungen, sehen Sie Ihre Prüfungsübersicht ein, und laden Sie Logos und Dokumente zum Thema Zertifizierung herunter.
Über Ihr Red Hat Konto können Sie auf Ihr Benutzerprofil, Ihre Einstellungen und andere Services abhängig von Ihrem Kundenstatus zugreifen.
Vergessen Sie zu Ihrer Sicherheit nicht, sich wieder abzumelden, wenn Sie die Red Hat Services auf einem öffentlichen Computer verwendet haben.Abmelden
The Friday Five is a weekly Red Hat® blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
2016 Red Hat Innovation Awards
Submissions for the Red Hat Innovation Awards close Friday, December 11, 2015. Each year, Red Hat recognizes the technological achievements of individuals, companies, and partners worldwide that demonstrate creative thinking, determined problem solving, and innovative use of Red Hat solutions. 1 winner for each of the 6 submission categories will be selected by a panel of industry-expert judges, and an overall 2016 Red Hat Innovator of the Year will be selected through online voting and announced at the 2016 Red Hat Summit, June 28-July 1 in San Francisco. Winners receive 2 passes to the 2016 Red Hat Summit plus 3 nights of hotel accommodations.
IN THE NEWS:
TechTarget - Red Hat cloud buoyed by Ansible buy, Microsoft partnership
In recent weeks, Red Hat acquired one of the major IT automation platforms and partnered with a public cloud giant, as it tries to position itself as the go-to open source provider of hybrid cloud and DevOps. Red Hat cloud moves since October include a partnership with Microsoft, the acquisition of automation provider Ansible and updates around containers, OpenStack and platform as a service. These moves show how Red Hat plans to compete for market share as more workloads move to cloud and distributed applications. The Ansible acquisition and the deal to make services including Red Hat Enterprise Linux available on Microsoft Azure come at a good time for the open source stalwart, said Jay Lyman, research manager at 451 Research LLC, in New York... The Ansible deal is Red Hat placing its bets on where the industry and enterprise customers are going with faster, agile software release processes and management, Lyman said. It also fits with its push around emerging technologies for DevOps, as Red Hat was an early supporter of container technologies Docker and Kubernetes.
WATCH THE VIDEO:
Red Hat - Peavey amplifies business intelligence
Audio equipment manufacturer Peavey Electronics needed faster performance from its analytics solution, as well as mobile reporting access for remote users. The company upgraded its analytical platform to SAP BusinessObjects and its reporting database to SAP HANA, running on a high performance NEC appliance and Red Hat Enterprise Linux for SAP HANA. Benefits include dramatically faster query response times, expanded reporting capabilities to mobile users, high availability, and increased productivity and employee morale, all at lower capital costs.
LinkedIn - Security Basics for Containers
Security for applications running in containers vs traditional security practices can seem daunting, but it doesn't need to be so. You can start by applying the same basic security practices you already implement elsewhere today. As Dan Walsh, the eminent container expert, put it: Treat services in containers just like regular services... Being able to trust the origin of a container, as well as having a mechanism to verify its authenticity & contents is probably the biggest recommendation I have as a starting point... Building on provenance, even when you trust your provider, what is inside the container matters. Be sure to validate the code inside the container to ensure it is not malicious and it meets your security practices. The easiest way to handle container provenance is to have a secured, private Docker registry within your environment.
CHECK IT OUT:
Red Hat Certification survey: Tell us how you really feel
At Red Hat, we know that becoming a Red Hat Certified Professional is not an easy process. Whether you're an IT manager seeking qualified individuals or an IT professional aiming to differentiate yourself to employers, we would like your view on Red Hat's hands-on approach to testing. Our hope is that the results of this survey will help us further improve the Red Hat Certification program. Please respond to the following questions as they relate to your view of Red Hat Certification. This survey should take 5-10 minutes to complete.
About the author
Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.