Home Blog Page 3

Deploying a virtual TripleO standalone OpenStack system

A walk-through on how to deploy a virtualized TripleO standalone system, including creating the components need to launch and connect to a VM. Also included is how to cleanup the deployment.
Read More at Enable Sysadmin

System administration is dead, long live system administration!

System administration is dead, long live system administration!

Comparing the skillsets of sysadmins from the “Gilded Age” of administration to those of the “Industrial Age.”
Scott McBrien
Wed, 12/30/2020 at 9:43pm

Image

Image by PublicDomainPictures from Pixabay 

A few weeks ago, I talked with the venerable Ken Hess on the “Red Hat Enterprise Linux Presents …” live stream. The topic of discussion was general systems administration practices, and it became clear that Ken and I have very different opinions of what that is.

Topics:  
Linux  
Linux Administration  
Career  
Read More at Enable Sysadmin

An introduction to hashing and checksums in Linux

Always wondered how to make use of a checksum? This introduction shows you what they mean, and how to use the proper tools to verify the integrity of a file.
Read More at Enable Sysadmin

Five ways to use redirect operators in bash

Redirect operators are a basic but essential part of working at the bash command line. See how to safely redirect input and output to make your Linux sysadmin life easier.
Read More at Enable Sysadmin

How to use whiptail to create more user-friendly interactive scripts

How to use whiptail to create more user-friendly interactive scripts

Do you script in bash? If so, you can provide your users with a more robust and simple TUI for entering information into scripts.
Damon Garn
Mon, 12/28/2020 at 9:52pm

Image

Photo by Pexels

Few sysadmins in the Linux world need to be convinced of the power and importance of scripts. Scripts are everywhere, and you know they’re essential to Linux system administration. Many scripts run silently, even if they are initiated manually by a user or an admin.

Some scripts, however, pass information to users or solicit information from them. You can use scripting features such as echo or read to accomplish these goals. Unfortunately, neither of these tools display the information in a fancy way or in a manner that gets the user’s attention.

Topics:  
Linux  
Linux Administration  
Bash  
Scripting  
Read More at Enable Sysadmin

Formatting tricks for the Linux date command

The Linux date command is simple, yet powerful. This article shows you how to unleash the power of the date command.
Read More at Enable Sysadmin

5 advanced rsync tips for Linux sysadmins

Use rsync compression and checksums to better manage file synchronization.
Read More at Enable Sysadmin

7 fun Linux containers/image transports features

If you work with Linux containers, here are seven fun transports features that you need to know.
Read More at Enable Sysadmin

13 questions for a quantum architect

13 questions for a quantum architect

With quantum computing on the horizon, take a look at which type of architect would be needed and what companies need to consider to build such complex systems.
Joachim Haller
Mon, 12/21/2020 at 6:22am

Image

Image from Pexels

With quantum computers already available for commercial use, albeit not in great quantity, I believe it is time for companies to start considering how to incorporate them into their arsenal of IT services. Time is running out for security teams to get their defenses in order ahead of the first quantum computer attack.

Right now, it’s not really possible to just buy the latest quantum computer model and take it for a spin. It takes some real architectural brain power to actually make such a computational beast fit into an existing structure.

Topics:  
Linux  
Quantum computing  
Read More at Enable Sysadmin

Multiprocess QEMU: Breaking up is hard to do

QEMU is the backbone of virtualization on Linux, providing control plane and emulation services for guest VMs. One of the most common complaints about QEMU stems from its monolithic nature — one process that does both control and emulation exposes more “surface area” that we, in turn, have to protect from security vulnerabilities. Well perhaps no longer, as multi-process QEMU has now been accepted…
Click to Read More at Oracle Linux Kernel Development