Articles

Lead Image © Ulrich Krellner, 123RF.com

Lead Image © Ulrich Krellner, 123RF.com

Managing Linux Filesystems

Linux filesystems range from block-based network filesystems, to temporary filesystems in RAM, to pseudo filesystems. We explain how filesystems are set up and how to manage them.
Lead Image © Tjefferson, 123RF.com

Lead Image © Tjefferson, 123RF.com

Virtual networks with Hyper-V in Windows Server 2016

Microsoft provides some interesting virtualization features in current and future versions of Windows Server. You can connect or isolate virtual machines, and Windows Server 2016 even supports virtual switches.
Lead Image © SV-Luma, 123RF.com

Lead Image © SV-Luma, 123RF.com

Live migration of virtual machines with KVM

Live migration of virtual machines is necessary when you need to achieve high-availability setups and load distribution.
Lead Image © Ping Han, 123RF.com

Lead Image © Ping Han, 123RF.com

Opportunities and risks: Containers for DevOps

Containers are an essential ingredient for various DevOps concepts, but used incorrectly, they do more harm than good.
Lead Image © Paul Tobeck, fotolia.com

Lead Image © Paul Tobeck, fotolia.com

Ease your network inventory pain with Spiceworks

Keeping track of hardware, software, and licenses is next to impossible in these days of BYOD and virtualization. Spiceworks Inventory solves the problem with a single, small executable full of open source software and a web browser.
Lead Image © Viktor Gladkov, 123RF.com

Lead Image © Viktor Gladkov, 123RF.com

What's new in Ansible 2.0

The new version of the Ansible IT automation platform has a revised and faster engine and 200 new modules.
Lead Image © krisckam, 123RF.com

Lead Image © krisckam, 123RF.com

Manage resources with AWS CloudFormation

CloudFormation lets you describe and manage a collection of Amazon Web Services resources. Defining associated dependencies and run-time parameters is quite easy with CloudFormation. We show you how to create a simple WordPress blog and delete it again.
Lead Image © Tatiana Popov, 123RF.com

Lead Image © Tatiana Popov, 123RF.com

Security first with the Hiawatha web server

The small but secure Hiawatha web server provides an appealing alternative to the complex Apache and other alternatives.
Lead Image © Boing, Photocase.com

Lead Image © Boing, Photocase.com

Encrypted backup with Duplicity

The free Duplicity backup program consistently encrypts all backups, which means that backups can even be stored in an insecure cloud.
Lead Image © fourseasons, 123RF.com

Lead Image © fourseasons, 123RF.com

Security analysis with Microsoft Advanced Threat Analytics

Classic security safeguards, like antivirus and firewall products, are imperative for system protection. To search proactively for network intruders, as well, Microsoft offers Advanced Threat Analytics – a tool that will help even less experienced admins.