Votre compte Red Hat vous permet d'accéder à votre profil, à vos préférences et aux services suivants en fonction de votre statut client :
Vous n'êtes pas encore inscrit ? Voici quelques bonnes raisons de le faire :
- Parcourez les articles de la base de connaissances, gérez les dossiers d'assistance et les abonnements, téléchargez des mises à jour et bien plus encore, le tout depuis un espace unique.
- Affichez la liste des utilisateurs de votre organisation et modifiez les informations, les préférences et les autorisations relatives à leur compte.
- Gérez vos certifications Red Hat, consultez l'historique de vos examens et téléchargez des logos et des documents relatifs à vos certifications.
Votre compte Red Hat vous permet d'accéder à votre profil, à vos préférences et à d'autres services en fonction de votre statut client.
Si vous utilisez un ordinateur public, déconnectez-vous de votre compte lorsque vous n'utilisez plus les services Red Hat afin de garantir votre sécurité.Déconnexion
The Friday Five is a weekly Red Hat® blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
IN THE NEWS:
Red Hat Named a Leader In Mobile Infrastructure Services by Independent Research Firm
Red Hat has been named a leader in "The Forrester WaveTM: Mobile Infrastructure Services, Q3 2015" by Forrester Research, and received the highest score among all vendors for the strategy category—an assessment of each vendor in terms of its vision, customer satisfaction, speed to market, and alliances.
Forbes - How One CEO Uses Extreme Openness To Lead 8,000 People
"Our customers want to hear our point of view on technology. But at the same time we want to make sure we stay very customer-focused... In order to resolve the conflict between leading and listening to our customers, I started talking about that challenge at employee meetings... I asked employees to try to build that challenge into what they did every day. Our customer support team then built a whole new system that can do proactive diagnostics. It looks at systems and sees where they have a problem. No senior manager, including me, had the idea to do that. I'd say I catalyzed the idea by saying that customer focus was important. Then our people went and did it. I didn't have to say, 'Let's build a product or form a customer council.' The organization just did it." —Jim Whitehurst, CEO, Red Hat
IN THE NEWS:
Red Hat shortlisted for V3 Technology Awards - Voting now open
V3 has announced its Technology Awards 2015 shortlist, and online voting is now open. Red Hat is nominated for Best Virtualisation Product, Best Cloud Computing Provider, and Product of the Year. Voting will close at 5pm on Friday 9 October. The results will be announced at the V3 awards ceremony at The Montcalm London on Friday, 27 November and will appear in a special online report on the V3 site. Note: V3 will not count votes from firms voting for themselves, so share with others!
IN THE NEWS:
Red Hat - Avianca Holdings Named 2015 Red Hat Innovator of the Year
Avianca Holdings, the oldest and one of the largest airlines in Latin America, has won the prestigious 2015 Red Hat Innovator of the Year award. The company was recognized at Red Hat Summit 2015... The organization implemented Red Hat's middleware stack as its main integration layer across three data centers, supporting the airline's core communication systems. For Avianca Holdings, Red Hat's open source solutions are delivering ten times better performance than technology offered by other "traditional" software vendors they have tried. Red Hat's middleware solutions, including Red Hat JBoss Fuse, also provide Avianca Holdings with a scalable option that works well with the company's other IT solutions—well-positioning the airline for future technology growth and innovation.
Telecom Drive - Why it is Important to Secure Sensors, Controllers in IoT Era
The Industrial Internet of Things (IoT) is revolutionizing how sensors and controllers are made and connected. The devices are becoming more capable and more intelligent... These new capabilities and features also come with new security concerns. Consider one vital fact: anything that can connect to a network is a computer. Computers are flexible, general purpose devices that can be modified—for good or for evil. And any connection to the network is an entry point into the network. If you[r] network strategy is built around perimeter security, each IoT device is effectively punching a hole in your security... [But] there are several things you can do to build a secure IoT...
About the author
Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.