Articles

Lead Image © Dan Barbalata, 123RF.com

Lead Image © Dan Barbalata, 123RF.com

Avoiding KVM configuration errors

Virtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example.
Lead Image © alphaspirit, 123RF.com

Lead Image © alphaspirit, 123RF.com

Sync identities with Microsoft Identity Manager

Learn how Microsoft Identity Manager 2016 can help sync identities in the local AD as well as Azure AD and Office 365.
Lead Image © James Thew, 123RF.com

Lead Image © James Thew, 123RF.com

Relational databases as containers

If you spend very much of your time pushing containerized services from server to server, you might be asking yourself: Why not databases, as well? We describe the status quo for RDBMS containers.
Lead Image © Shao-Chun Wang, 123RF.com

Lead Image © Shao-Chun Wang, 123RF.com

Monitor Windows systems and Linux servers

The Microsoft Operations Management Suite provides a comprehensive monitoring solution in the cloud that offers a high degree of flexibility and scalability.
Lead Image © zelfit, 123RF.com

Lead Image © zelfit, 123RF.com

Harden your OpenStack configuration

Any OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar.
Lead Image © Tom Baker, 123RF.com

Lead Image © Tom Baker, 123RF.com

The Cuckoo sandboxing malware analysis tool

The open source Cuckoo Sandbox malware analysis system investigates malicious software.
Lead Image © Kirill Cherezov, 123RF.com

Lead Image © Kirill Cherezov, 123RF.com

Software-defined networking with Windows Server 2016

Windows Server 2016 takes a big step toward software-defined networking, with the Network Controller server role handling the centralized management, monitoring, and configuration of network devices and virtual networks. This service can also be controlled with PowerShell and is particularly interesting for Hyper-V infrastructures.
Lead Image © Andrea Danti, 123RF.com

Lead Image © Andrea Danti, 123RF.com

Highly available Hyper-V in Windows Server 2016

Microsoft has extended the failover options for Hyper-V in Windows Server 2016 to include two new cluster modes, as well as the ability to define an Azure Cloud Witness server. We look at how to set up a Hyper-V failover cluster.
Lead Image © Igor Stevanovic, 123RF.com

Lead Image © Igor Stevanovic, 123RF.com

Digital signatures in package management

Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
Lead Image © bowie15, 123RF.com

Lead Image © bowie15, 123RF.com

Features of PowerShell loops

Optimize your PowerShell scripts with loops when automating tasks that are repeated regularly and frequently.