This e-guide details the 77 most useful Linux commands.01 Nov 2013
Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
Cloud computing on Linux, Linux high-performance computing and supercomputing, Linux server hardware, Linux virtualization, Linux backup and storage, Linux network administration, Open source projects in the cloud
Mainframe systems need comprehensive preparations to maintain business continuity during a disaster. Unfortunately, there's no easy way to accommodate the mainframe in BC.
IBM acquired cognitive computing provider AlchemyAPI in the hopes it can whip up an application elixir that gives Watson new life.
Virtualization is a great idea, but not for everything in the data center. Even if your goal is 100% virtualization, leave these servers off the list.
Hyper-V offers many features, but when its run on SCVMM 2012 R2, there is more flexibility with what you can do.
Virtualization documentation can swallow up huge chunks of time if you have to retrace your steps. Recording what you do as you do it could save lots of time down the road.
It's important to not only take the big issues into consideration but also remember about small problems to keep a secure virtualization environment.
Linux containers are nothing new. But with the rise of Docker, Red Hat Atomic Host is being rolled out as an OS focusing on security and the surrounding infrastructure.
Open source cloud allows enterprises to dodge software payments and vendor lock-in. But some organizations are better off walking away.
A cloud services broker role can be filled by a third party, a cloud provider or even in-house IT. So which is the best option for my business?
An .xpx file can cause problems for Office 2002 SP3 users, but Microsoft does provide help in Windows 7 and with a free XPS viewer.
Mobile device management, mobile application management and mobile information management form a security trio that protect data in the age of BYOD.
Desktop patch management is subject to its share of myths. Our expert penetrates the fog around waiting on software patching and Windows XP security.