Articles

Lead Image © James Thew, 123RF.com

Lead Image © James Thew, 123RF.com

Relational databases as containers

If you spend very much of your time pushing containerized services from server to server, you might be asking yourself: Why not databases, as well? We describe the status quo for RDBMS containers.
Lead Image © Shao-Chun Wang, 123RF.com

Lead Image © Shao-Chun Wang, 123RF.com

Monitor Windows systems and Linux servers

The Microsoft Operations Management Suite provides a comprehensive monitoring solution in the cloud that offers a high degree of flexibility and scalability.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

Harden your OpenStack configuration

Any OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar.
Lead Image © Tom Baker, 123RF.com

Lead Image © Tom Baker, 123RF.com

The Cuckoo sandboxing malware analysis tool

The open source Cuckoo Sandbox malware analysis system investigates malicious software.
Lead Image © Kirill Cherezov, 123RF.com

Lead Image © Kirill Cherezov, 123RF.com

Software-defined networking with Windows Server 2016

Windows Server 2016 takes a big step toward software-defined networking, with the Network Controller server role handling the centralized management, monitoring, and configuration of network devices and virtual networks. This service can also be controlled with PowerShell and is particularly interesting for Hyper-V infrastructures.
Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Highly available Hyper-V in Windows Server 2016

Microsoft has extended the failover options for Hyper-V in Windows Server 2016 to include two new cluster modes, as well as the ability to define an Azure Cloud Witness server. We look at how to set up a Hyper-V failover cluster.
Lead Image © Igor Stevanovic, 123RF.com

Lead Image © Igor Stevanovic, 123RF.com

Digital signatures in package management

Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
Lead Image © 36clicks, 123RF.com

Lead Image © 36clicks, 123RF.com

Installing .NET on Linux

By the time the annual 2016 Red Hat Summit was held at the end of June in San Francisco, the previously announced support for .NET applications on Red Hat Enterprise Linux had been implemented. We take a closer look at the implementation and how admins can create a .NET environment under Linux.
Lead Image © bowie15, 123RF.com

Lead Image © bowie15, 123RF.com

Features of PowerShell loops

Optimize your PowerShell scripts with loops when automating tasks that are repeated regularly and frequently.
Lead Image © Chalong Tawan, 123RF.com

Lead Image © Chalong Tawan, 123RF.com

Microsegmentation in the data center

Microsegmentation promises substantial improvements over classic architectures for the protection of applications and increased security when building out the efficiency of a data center.