Tags: System Administration

Reckoning the Spectre and Meltdown Performance Hit for HPC

While no one has yet created an exploit to take advantage of the Spectre and Meltdown speculative execution vulnerabilities that were exposed by Google six months ago and that were revealed in early January, it is only a matter of time. The patching frenzy has not settled down yet, and a big...
Read 0 Comments

The Effects of the Spectre and Meltdown Vulnerabilities

Spectre and Meltdown aren't anomalies. They represent a new area to look for vulnerabilities and a new avenue of attack. They're the future of security­ -- and it doesn't look good for the defenders. Modern computers do lots of things at the same time. Your computer and your phone simultaneously...
Read 0 Comments

How to Control Systemd Services on Remote Linux Server

Systemd system and services manager can be controlled using the systemctl command line utility. It enables you to manage systemd locally or on a remote Linux machine over the SSH protocol. In this short article, we will show you how to manage systemd system and service manager on a remote Linux...
Read 0 Comments

Unix and Linux System Administration Handbook – Book Review

Computer programmers, website developers, and people learning the basics as production managers of Linux and Unix systems will be able to acquire new information from this handbook. After reading this book, I wanted to share some of the key points with advanced engineers, as well as people starting...
Read 0 Comments

The Future of DevOps Is Mastery of Multi-Cloud Environments

DevOps is a set of practices that automates the processes between software development and IT teams so they can build, test, and release software more quickly and reliably. The concept of DevOps is founded on building a culture of collaboration between IT and business teams, which have historically...
Read 0 Comments

8 Takeaways from NIST’s Application Container Security Guide

Companies are leveraging containers on a massive scale to rapidly package and deliver software applications. But because it is difficult for organizations to see the components and dependencies in all their container images, the security risks associated with containerized software delivery has...
Read 0 Comments

DevOps: Is It More Than Just A Name?

The title of DevOps Engineer has consistently been gaining momentum for over five years. From the outside, it appeared it might be a corporate preference to call an individual a DevOps engineer as opposed to a System Administrator. It was thought they were virtually one and the same. As time has...
Read 0 Comments

Five Edge Data Center Myths

With mobile and last-mile bandwidth coming at a premium and modern applications needing low-latency connections, compute is moving from centralized data centers to the edge of the network. But there a lot of myths about edge data centers. Here’s what organizations are typically getting wrong,...
Read 0 Comments

open-door.jpg

LiFT scholarships
The Linux Foundation Training (LiFT) Scholarships aim to help train the developers and IT professionals of the future.

LiFT Scholarship Winners: Teens and Academic Aces Learn Open Source Skills

Four people have been named recipients of the seventh annual Linux Foundation Training (LiFT) Scholarships for 2017 in the “Academic Aces” and “Teens in Training” categories. Teens in Training vinicius_melo.jpg Vinícius Almeida Used with permission Vinícius Almeida...
Read 0 Comments

TNS Guide: How to Manage Passwords and Keep Your Online Accounts Secure

Massive data breaches over the past several years have shown that you can’t trust online service providers to keep your account information secure. So, if you haven’t done this until now, it’s time to carefully consider what and how you share with such companies, starting with your password. First...
Read 0 Comments

Pages

Click Here!