Well, well, RHEL – A look at the RHEL 8 Beta

Does anyone remember the calculator watch? I suppose I speak of it as a passing antiquated technology, but then again you can buy a new one off of Amazon right now. What’s really amazing is how computers are just an evolution of the calculator watch – fundamentally all computers do is compute values, store them[…]

Read More…

We’re Hitting the Road

Well, I don’t know about you but it’s been one crazy year so far – and we’re only in the first week of February! Busy would also be another good description of the last short while, but we like to think that’s a good problem to have. Fierce Software had a great close to the[…]

Read More…

DevOps Starter Pack

If you didn’t know about it, Red Hat is running a DevSecOps Roadshow right now!  They’re going on tour from city to city spreading the good word of Red Hat OpenShift and the value it delivers in a DevSecOps pipeline, and the benefit it draws into the Software Development Lifecycle.  I was fortunate enough to[…]

Read More…

Zero to Hero: Enterprise DevOps with CloudBees and Red Hat

If you’ve had a look at our line card then you can probably deduce that we like Open-Source, yeah that one’s easy. We’ve partnered with some of the biggest Open-Source leaders and really enjoy and value the relationships we’ve built over time. In fact, we just recently were awarded Public Sector Partner of the Year[…]

Read More…

Giving back: Contributing to Open-Source Software

If you know a thing or two about us here at Fierce Software™, it’s that we live for Open-Source Software. Really, we mean that. Our strongest partnerships are with those around open-source solutions, such as Red Hat, Hortonworks, CloudBees, and Elastic. I could go on and on about the benefits and value of open-source, but[…]

Read More…

Red Hat IdM Pt I: Identity, Auth, and Policies! Oh My!

Red Hat Identity Management
Welcome to the first in a 3-part series over Red Hat’s Identity Management product, or otherwise referred to as “IdM”.  In this post we’ll be going over the generalities of Red Hat IdM, how to install and configure it, building an IdM lab to use later, and next steps.  Part 2 will be over “Integration[…]

Read More…