ADMIN editor Joe Casad chats with Bill Mannel, SGI's Vice President for Server Marketing, on the latest release of SGI's Altix ICE high performance computing platform.
Simulations and the ability to predict the future can show what effect adding new hardware, or changing the load, can have. Armed with the right know-how, anybody can use this tool.
Performance can be a problem if you run additional services like Sharepoint, Exchange, or SQL on a Windows server. Luckily, the Windows tools described here can help administrators identify and resolve these problems.
Virtualized systems are inflationary when it comes to RAM requirements. Storage access is faster when excess RAM is used as a page cache, and having enough RAM helps avoid the dreaded performance killer, swapping. We take a look at the current crop of RAM.
If you want to use your UCS as the underpinnings for Zarafa, you will appreciate the good work that Univention partner LINET has done on the zarafa4ucs integration package.
Office 365 is Microsoft's new, easy-to-manage cloud solution for email, tasks, and contacts, as well as real-time collaboration throughout the enterprise.
Intruders rely on ARP cache poisoning to conceal their presence on a local network. We'll show you some tools an attacker might use to poison the ARP cache and gather information on your network.
Performance problems with virtual servers on Hyper-V are often caused by a network access bottleneck, but various optimization settings can help speed things up.
Most cloud providers offer their own APIs, which means cloud users sign up for the services of one provider at the expense of being able to migrate easily to other providers later. Apache Deltacloud addresses this issue by offering a standardized API for infrastructure as a service (IaaS) clouds.
The new cgroups feature provides an administrative approach to restricting resource use. This application is particularly interesting for virtualized systems.
"Easy to remember but difficult to guess" isn't just a catchy phrase for choosing passwords, it's the law of the Net. Learn how to check your password using a tool network intruders use every day: John the Ripper.