Learn how you can maintain less and create more when moving from Microsoft Windows to Red Hat Enterprise Linux.
Learn more: www.redhat.com/infrastructure
As container use gains popularity, container security is more important than ever. This talk is split into 4 parts detailing security measures in containers, signing, authentication and authorization with the daemon, and mandatory access control.
In this 2-hour session, Jeremy Eder, D. John Shakshober, and Larry Woodman explore how to configure and tune Red Hat Enterprise Linux for optimal performance while running a variety of common applications.
You’ll learn how to:
Sanjay Rao — Principal Software Engineer, Red Hat, Inc.
In this session, we’ll give you recommendations for how to tune Red Hat Enterprise Linux to optimize your database’s performance.