Linux Unix Training Classes in Jacksonville, North Carolina

Learn Linux Unix in Jacksonville, NorthCarolina and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current Linux Unix related training offerings in Jacksonville, North Carolina: Linux Unix Training

We offer private customized training for groups of 3 or more attendees.
Jacksonville  Upcoming Instructor Led Online and Public Linux Unix Training Classes
Enterprise Linux System Administration Training/Class 14 April, 2025 - 18 April, 2025 $2190
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
Linux Fundaments GL120 Training/Class 2 June, 2025 - 6 June, 2025 $2090
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
LINUX SHELL SCRIPTING Training/Class 30 June, 2025 - 1 July, 2025 $990
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
OpenShift Fundamentals Training/Class 28 April, 2025 - 30 April, 2025 $2090
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX AUTOMATION WITH ANSIBLE Training/Class 21 April, 2025 - 24 April, 2025 $2735
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN I Training/Class 24 March, 2025 - 28 March, 2025 $2090
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
RED HAT ENTERPRISE LINUX SYSTEMS ADMIN II Training/Class 18 August, 2025 - 21 August, 2025 $1890
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
RHCSA EXAM PREP Training/Class 16 June, 2025 - 20 June, 2025 $2090
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration
DOCKER WITH KUBERNETES ADMINISTRATION Training/Class 17 March, 2025 - 21 March, 2025 $2490
HSG Training Center instructor led online
Jacksonville, North Carolina
Hartmann Software Group Training Registration

View all Scheduled Linux Unix Training Classes

Linux Unix Training Catalog

cost: $ 1390length: 4 day(s)
cost: $ 1390length: 4 day(s)
cost: $ 1990length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2800length: 4 day(s)
cost: $ 2490length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2290length: 4 day(s)
cost: $ 2190length: 5 day(s)
cost: $ 1690length: 4 day(s)
cost: $ 1890length: 3 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1290length: 3 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 1290length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1090length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2400length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2490length: 4 day(s)
cost: $ 990length: 2 day(s)
cost: $ 2290length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2400length: 4 day(s)
cost: $ 2090length: 3 day(s)
cost: $ 2090length: 3 day(s)
cost: $ 1790length: 4 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1690length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2590length: 3 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1690length: 5 day(s)
cost: $ 1390length: 4 day(s)

DevOps Classes

cost: $ 1690length: 3 day(s)
cost: $ 1690length: 3 day(s)

Foundations of Web Design & Web Authoring Classes

cost: $ 1290length: 3 day(s)
cost: $ 790length: 2 day(s)
cost: $ 1190length: 3 day(s)

Java Programming Classes

cost: $ 1390length: 3 day(s)
cost: $ 1390length: 3 day(s)

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

Studying a functional programming language is a good way to discover new approaches to problems and different ways of thinking. Although functional programming has much in common with logic and imperative programming, it uses unique abstractions and a different toolset for solving problems. Likewise, many current mainstream languages are beginning to pick up and integrate various techniques and features from functional programming.

Many authorities feel that Haskell is a great introductory language for learning functional programming. However, there are various other possibilities, including Scheme, F#, Scala, Clojure, Erlang and others.

Haskell is widely recognized as a beautiful, concise and high-performing programming language. It is statically typed and supports various cool features that augment language expressivity, including currying and pattern matching. In addition to monads, the language support a type-class system based on methods; this enables higher encapsulation and abstraction. Advanced Haskell will require learning about combinators, lambda calculus and category theory. Haskell allows programmers to create extremely elegant solutions.

Scheme is another good learning language -- it has an extensive history in academia and a vast body of instructional documents. Based on the oldest functional language -- Lisp -- Scheme is actually very small and elegant. Studying Scheme will allow the programmer to master iteration and recursion, lambda functions and first-class functions, closures, and bottom-up design.

Supported by Microsoft and growing in popularity, F# is a multi-paradigm, functional-first programming language that derives from ML and incorporates features from numerous languages, including OCaml, Scala, Haskell and Erlang. F# is described as a functional language that also supports object-oriented and imperative techniques. It is a .NET family member. F# allows the programmer to create succinct, type-safe, expressive and efficient solutions. It excels at parallel I/O and parallel CPU programming, data-oriented programming, and algorithmic development.

Scala is a general-purpose programming and scripting language that is both functional and object-oriented. It has strong static types and supports numerous functional language techniques such as pattern matching, lazy evaluation, currying, algebraic types, immutability and tail recursion. Scala -- from "scalable language" -- enables coders to write extremely concise source code. The code is compiled into Java bytecode and executes on the ubiquitous JVM (Java virtual machine).

Like Scala, Clojure also runs on the Java virtual machine. Because it is based on Lisp, it treats code like data and supports macros. Clojure's immutability features and time-progression constructs enable the creation of robust multithreaded programs.

Erlang is a highly concurrent language and runtime. Initially created by Ericsson to enable real-time, fault-tolerant, distributed applications, Erlang code can be altered without halting the system. The language has a functional subset with single assignment, dynamic typing, and eager evaluation. Erlang has powerful explicit support for concurrent processes.

 

Computer Programming as a Career?

What little habits make you a better software engineer?

In recent decades, companies have become remarkably different than what they were in the past. The formal hierarchies through which support staff rose towards management positions are largely extinct. Offices are flat and open-plan collaborations between individuals with varying talent who may not ever physically occupy a corporate workspace. Many employed by companies today work from laptops nomadically instead. No one could complain that IT innovation hasn’t been profitable. It’s an industry that is forecasted to rake in $351 billion in 2018, according to recent statistics from the Consumer Technology Association (CTA). A leadership dilemma for mid-level IT managers in particular, however, has developed. Being in the middle has always been a professional gray area that only the most driven leverage towards successful outcomes for themselves professionally, but mid-level managers in IT need to develop key skills in order to drive the level of growth that the fast paced companies who employ them need. 

What is a middle manager’s role exactly? 

A typical middle manager in the IT industry is usually someone who has risen up the ranks from a technical related position due to their ability to envision a big picture of what’s required to drive projects forward. A successful middle manager is able to create cohesion across different areas of the company so that projects can be successfully completed. They’re also someone with the focus necessary to track the progress of complex processes and drive them forward at a fast pace as well as ensure that outcomes meet or exceed expectations.

What challenges do middle managers face in being successful in the IT industry today? 

While middle managers are responsible for the teams they oversee to reach key milestones in the life cycle of important projects, they struggle to assert their power to influence closure. Navigating the space between higher-ups and atomized work forces is no easy thing, especially now that workforces often consist of freelancers with unprecedented independence. 

What are the skills most needed for an IT manager to be effective? 

Being educated on a steady basis to handle the constant evolution of tech is absolutely essential if a middle manager expects to thrive professionally in a culture so knowledge oriented that evolves at such a rapid pace. A middle manager who doesn't talk the talk of support roles or understand the nuts and bolts of a project they’re in charge of reaching completion will not be able to catch errors or suggest adequate solutions when needed. 

How has the concept of middle management changed? 

Middle managers were basically once perceived of as supervisors who motivated and rewarded staff towards meeting goals. They coached. They toggled back and forth between the teams they watched over and upper management in an effort to keep everyone on the same page. It could be said that many got stuck between the lower and upper tier of their companies in doing so. While companies have always had to be result-oriented to be profitable, there’s a much higher expectation for what that means in the IT industry. Future mid-level managers will have to have the same skills as those whose performance they're tracking so they can determine if projects are being executed effectively. They also need to be able to know what new hires that are being on-boarded should know to get up to speed quickly, and that’s just a thumbnail sketch because IT companies are driven forward by skills that are not easy to master and demand constant rejuvenation in the form of education and training. It’s absolutely necessary for those responsible for teams that bring products and services to market to have similar skills in order to truly determine if they’re being deployed well. There’s a growing call for mid-level managers to receive more comprehensive leadership training as well, however. There’s a perception that upper and lower level managers have traditionally been given more attention than managers in the middle. Some say that better prepped middle managers make more valuable successors to higher management roles. That would be a great happy ending, but a growing number of companies in India’s tech sector complain that mid-level managers have lost their relevance in the scheme of the brave new world of IT and may soon be obsolete.

 

 

 

 

I suspect that many of you are familiar with the term "hard coding a value" whereby the age of an individual or their location is written into the condition (or action) of a business rule (in this case) as shown below:

if customer.age > 21 and customer.city == 'denver'

then ...

Such coding practices are perfectly expectable provided that the conditional values, age and city, never change. They become entirely unacceptable if a need for different values could be anticipated. A classic example of where this practice occurred that caused considerable heartache in the IT industry was the Y2K issue where dates were updated using only the last 2 digits of a four digit number because the first 2 digits were hard-coded to 19 i.e. 1998, 1999. All was well provided that the date did not advance to a time beyond the 1900’s since no one could be certain of what would happen when the millennia arrived (2000). A considerably amount of work (albeit boring) and money, approximately $200 billion, went into revising systems by way of software rewrites and computer chip replacements in order to thwart any detrimental outcomes. It is obvious how a simple change or an assumption can have sweeping consequences.

You may wonder what Y2K has to do with Business Rule Management Systems (BRMS). Well, what if we considered rules themselves to be hard-coded. If we were to write 100s of rules in Java, .NET or whatever language that only worked for a given scenario or assumption, would that not constitute hard-coded logic? By hard-coded, we obviously mean compiled. For example, if a credit card company has a variety of bonus campaigns, each with their own unique list of rules that may change within a week’s time, what would be the most effective way of writing software to deal with these responsibilities?

When eCommerce companies want to optimize information security, password management tools enable users to create strong passwords for every login.

Better than a Master Pass
A two-factor authentication, a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code can drastically reduce online fraud such as identity theft . A common example of two-factor authenticationis a bank card: the card itself is the physical item and the personal identification number (PIN) is the data that goes with it.

LastPass 3.0 Premium and RoboForm, security downloads offer fingerprint-based authentication features that can be configured to any computer PC or mobile application.  Both are supported by the Google Authenticator mobile app for smart phone and device integration.

LastPass 3.0 is most powerful on-demand password manager on the market. LastPass 3.0 Premium includes mobile support and more features. Dashlane 2.0 is is not as robust, but includes a user-friendly interface. F-Secure Key is a free, one-device version of these top competitors. F-Secure Key is for exclusive use on an installed device, so password safe retention is dependent on proprietary use of the device itself. The application can be upgraded for a small annual fee.

Password Manager App Cross-Portability
F-Secure Key syncs with Mac, PC Android, and iOS devices simultaneously. A transient code is generated on mobile devices, in addition to the two-factor authentication default of the F-Secure Key master password security product.

Password capture and replay in case of lost credentials is made possible with a password manager. Integration of a password manager app with a browser allows a user to capture login credentials, and replay on revisit to a site. Dashlane, LastPass, Norton Identity Safe, Password Genie 4.0 offer continuous detection and management of password change events, automatically capturing credentials each time a new Web-based, service registration sign up is completed.

Other applications like F-Secure Key, KeePass, and My1login replay passwords via a bookmarklet, supported by any Java-equipped browser. KeePass ups the ante for would be keyloggers, with a unique replay technology.

Personal Data and Auto-Fill Forms
Most password managers fill username and password credentials into login forms automatically. Password managers also retain personal data for form fill interfaces with applications, and other HTML forms online. The RoboForm app is one of the most popular for its flexibility in multi-form password and personal data management, but the others also capture and reuse at least a portion of what has been entered in a form manually.

The 1Password app for Windows stores the most types of personal data for use to fill out forms. Dashlane, LastPass, and Password Genie store the various types of ID data used for form fill-in, like passport and driver's license numbers and other key details to HTML acknowledgement of discretionary password and personal information.

The Cost of Protection
LastPass Premium and Password Box are the lowest monthly password manager plans on the market, going for $1 a month. Annual plans offered by other password manager sources vary according to internal plan: Dashlane $20, F-Secure Key $16, and Password Genie, $15.
All password manager companies and their products may not be alike in the end.

Security checks on security products like password managers have become more sophisticated in response to product cross-portability and open source app interface volatility. Norton, RoboForm, KeePass, generate strong, random passwords on-demand. Some security procedures now require three-factor authentication, which involves possession of a physical token and a password, used in conjunction with biometricdata, such as finger-scanningor a voiceprint.

 

What are the best languages for getting into functional programming?

Computer Programming as a Career?

Tech Life in North Carolina

The University of North Carolina Chapel Hill is the oldest State University in the United States. There are significant “firsts” in this state one being, the first state to own an art museum and second was to vote in the first African-American member, Hiram Rhoades Revels, into the United States Congress. Higher education is a given with a total of 2,425 public schools in the state, including 99 charter schools.
There is only one problem with common sense; it's not very common. Mitt Bryce
other Learning Options
Software developers near Jacksonville have ample opportunities to meet like minded techie individuals, collaborate and expend their career choices by participating in Meet-Up Groups. The following is a list of Technology Groups in the area.
Fortune 500 and 1000 companies in North Carolina that offer opportunities for Linux Unix developers
Company Name City Industry Secondary Industry
Branch Banking and Trust / BBandT Winston Salem Financial Services Banks
UTC Aerospace Systems Charlotte Manufacturing Aerospace and Defense
R.J. Reynolds Tobacco Company Winston Salem Manufacturing Manufacturing Other
Family Dollar Stores, Inc. Matthews Retail Department Stores
Duke Energy Corporation Charlotte Energy and Utilities Gas and Electric Utilities
Lowe's Companies, Inc. Mooresville Retail Hardware and Building Material Dealers
Nucor Corporation Charlotte Manufacturing Metals Manufacturing
VF Corporation Greensboro Manufacturing Textiles, Apparel and Accessories
Bank of America Charlotte Financial Services Banks
Laboratory Corporation of America Burlington Healthcare, Pharmaceuticals and Biotech Diagnostic Laboratories
Sonic Automotive, Inc. Charlotte Retail Automobile Dealers
SPX Corporation Charlotte Manufacturing Tools, Hardware and Light Machinery
The Pantry, Inc. Cary Retail Gasoline Stations

training details locations, tags and why hsg

A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations in North Carolina since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about Linux Unix programming
  • Get your questions answered by easy to follow, organized Linux Unix experts
  • Get up to speed with vital Linux Unix programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Jacksonville, North Carolina Linux Unix Training , Jacksonville, North Carolina Linux Unix Training Classes, Jacksonville, North Carolina Linux Unix Training Courses, Jacksonville, North Carolina Linux Unix Training Course, Jacksonville, North Carolina Linux Unix Training Seminar

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.