Message from the top of Red Hat Summit

Year after year, there seem to be more conferences, conventions, meetups, and user groups – just like acronyms, a never-ending supply in the Technology space! Here at Fierce Software we proudly support our vendors, and we’re known for making a show of it too. We don’t just wave our flags at events, we make our[…]

Read More…

Well, well, RHEL – A look at the RHEL 8 Beta

Does anyone remember the calculator watch? I suppose I speak of it as a passing antiquated technology, but then again you can buy a new one off of Amazon right now. What’s really amazing is how computers are just an evolution of the calculator watch – fundamentally all computers do is compute values, store them[…]

Read More…

Red Hat IdM Pt I: Identity, Auth, and Policies! Oh My!

Red Hat Identity Management
Welcome to the first in a 3-part series over Red Hat’s Identity Management product, or otherwise referred to as “IdM”.  In this post we’ll be going over the generalities of Red Hat IdM, how to install and configure it, building an IdM lab to use later, and next steps.  Part 2 will be over “Integration[…]

Read More…