October 2006 | Archive by Month | SearchEnterpriseLinux.com | Page 2

October 2006

  • Sun rolls out data center Winnebago

    Today Sun Microsystems will introduce the first prefabricated data center. The prototype, dubbed "Sun Black Box," is fully configured inside a standard shipping container.

  • MySQL's Marten Mickos on GPLv3 and automated enterprise monitoring

    MySQL CEO Marten Mickos wants the everyday DBA to become more powerful. In this interview, he tells SearchOpenSource.com about automated monitoring technology in the new MySQL Enterprise that does ...

  • Ajax everywhere: Which framework to choose?

    Writing and debugging Ajax, a JavaScript- and XML-driven development technique, can be difficult. In this tip, an expert introduces several frameworks like Prototype and Scriptaculous, to ease prog...

  • Should you dump Unix for Linux?

    The need for modernization and cost reduction, or a change in leadership, may mean migration away from your existing Unix platform. If your company is the type to scale horizontally and you're unco...

  • Check out IBM POWER5, Linux and virtualization

    If you're not ready to give up Unix completely, consider using IBM's POWER5 architecture, which supports Linux and Unix.

  • Author dishes on SELinux enhancements to RHEL5

    The reason SELinux is complex is because Linux is a full-featured OS that requires it, said one expert. The next version of Red Hat Linux aims to simplify things with out-of-the-box policy modules ...

  • Sybase ASE 15 diagram

    Sybase expert Mich Talebzadeh has created a diagram of Sybase ASE 15's architecture for those who need a quick reference.

  • OSSEC: The server and agent model

    Get the benefit of regular alerts and status reports from configuring open source IDS/IPS OSSEC to run as a server and agent model.

  • Developing OSS apps

    Open source issues and strategies expert Don Rosenberg explains why developing your own open source app can be beneficial.

  • Converting SQL Server procedure to MySQL 5.0

    MySQL expert Scott Noyes provides code on how to convert a procedure from SQL Server 2000 to MySQL 5.0.

  • Sybase ASE: Performance benefits of DPL and DRL

    Take advantage of data page locking (DPL) and data row locking (DRL), two categories of data only locked (DOL) tables in Sybase ASE. These functions offer improved table scans, decreased logical I/...

  • Nmap and the open source debate

    Nmap -- a mature, open source network mapping and exploration tool -- could win over companies resistant to open source software, says IT consultant Michael Cobb in this tip.

  • OSS benefits for government agencies

    Open source issues and strategies expert Don Rosenberg explains the benefits of open source software to government agencies.

  • Host intrusion detection with OSSEC

    Keep your corporate network secure with open source OSSEC, an intrusion detection and prevention services tool that provides host agent and file integrity agent capabilities on Windows and Linux. I...

  • Linux on 64-bit blades: Choosing the right servers and distributions

    Mix Linux and 64-bit blades well, and you'll get super performance, stability and flexibility, says consultant Patrick Green. Here, he offers tips on how to avoid compatibility mishaps.

  • Migrating from Unix-Linux in 7 steps

    Make sure you've got all your bases covered with this checklist on the process of migrating from Unix to Linux.

  • IP addressing and subnetting: What network administrators need to know

    David Davis follows up his tip on binary-to-decimal conversions with a practical, in-depth look at IP addressing and subnetting. He discusses how IP addresses work, subnet masks, classful vs. class...

  • Open Season: Google searches code

    Google launches Google Code Search; Fonality scoops up world's largest Asterisk-based community in trixbox.

  • Ubuntu Linux: Server and desktop

    Exploring different Linux distributions? Check out Ubuntu, a Debian-based Linux distribution whose name is derived from a Zulu word meaning "humanity towards others."

  • Mozilla still looking into Firefox flaw claims

    Although two hackers confessed that the JavaScript vulnerability they found was a hoax, Mozilla still wants to be sure.