Each month our team of expert editors addresses the changing role of IT by helping savvy technology professionals navigate both the technical and cultural challenges wrought by vendor-hype, user-demands, and technology requirements.DOWNLOAD THIS MONTH’S E-ZINE ISSUE NOW!
Cloud computing on Linux, Linux high-performance computing and supercomputing, Linux server hardware, Linux virtualization, Linux backup and storage, Linux network administration, Open source projects in the cloud
There's a lot of hype about continuous deployment in DevOps circles, but it can be disastrous if the right culture and organization aren't in place.
GPUs offload the burden of demanding computational tasks from central processors. Integrate GPU into enterprise servers to manage intense computing.
It's time to knock down those silos, one by one. IT is transforming from a siloed set of reactive cost centers into a service provider with a focus on helping the business compete.
In data centers, N+1 redundancy is used to express the idea that a system should be designed to withstand the loss of a component.
Docker containers are fast, easy to use and largely free. In terms of performance, they have even been called comparable to KVM. But that doesn't mean Docker containers are right for everyone.
Linux Containers have been around for a while, so how is that technology different from application containerization offered by companies like Docker?
Rackspace CTO John Engates talks Amazon, niche markets and all the reassuring the company had to do as outsiders debated the company's future.
With all the hype around hybrid cloud, many companies say they're using the model when they're really just using both public and private cloud. What makes it a true hybrid cloud?
Take it from the experts: Migrating an application to the cloud doesn't have to be as hard as it seems. But that doesn't mean you can jump in without proper planning and forethought.
Software as a service may be one reason for choosing Office 365 over Office 2013, but licensing and update frequency are other considerations.
Switching from the Windows Explorer shell to a particular app can be useful for single-purpose devices, but users can still foil Windows kiosk mode.
The number of endpoint security vulnerabilities is daunting, but endpoint admins should first focus on updating patches against Windows malware.