Recruiting and managing technical talent is challenging. Red Hat certifications help organizations identify, develop, and retain professionals who are skilled, proven, and ready. Learn how Red Hat is helping customers find qualified professionals to work on Red Hat technologies.
Learn about key considerations for designing a secure, highly available Ceph cluster in this Red Hat Consulting whiteboard series video.
Learn more: http://www.redhat.com/en/services/consulting
In this Red Hat Consulting whiteboard series video, learn about the role of appliances in Red Hat CloudForms, as well as an architectural overview of high availability options for enterprise clouds.
Learn how OpenShift Enterprise 3.1 by Red Hat provides powerful networking and gives your applications and services dynamic availability.
OpenShift 3.1 by Red Hat simplifies data persistence in containerized applications. In addition to continued network file system (NFS) support, OpenShift now lets Docker containers use GlusterFS, Ceph, iSCSI, Fibre Channel, and Amazon Elastic Block Storage (EBS) for data persistence.
Instructors and students from East Carolina University discuss the benefits of partnering with Red Hat Academy to teach Linux and other open source skills, deliver certification exams, and prepare students for a successful career in open source information technology.
Mary Johnston Turner, IDC Research Vice President of Enterprise System Management Software, walks through a recent survey of IT decision makers and the reviews results on the importance of integration between cloud-native and conventional applications.
The demo video shows you how easy and fast it is to build a mobile app on the Red Hat® Mobile Application Platform.
This demo video shows you how to use MBaaS services on the Red Hat® Mobile Application Platform to integrate with backend systems and promote code reuse across multiple app projects.
As you will see in this demo, Red Hat® Insights provides ongoing in-depth analysis of your Red Hat infrastructure to proactively identify key threats related to security, stability, and performance.