Choosing the right filesystem for a particular job can be a difficult task. We tested seven candidates and found some interesting results to make an administrator's choice easier.
The Julia language is a very powerful parallel computing model that works across multiple cores and cluster nodes. Can this new language deliver on bold claims of fast, easy, and parallel?
NAS filers are typically closed systems that prevent users from installing anything – including a simple backup agent. But what happens if you need a backup?
The Prelude security information and event management system has risen from the ashes of bankruptcy. In this article, we introduce you to the concepts and architecture of Prelude.
Windows networks can be configured from a graphical interface, but if you want to explore all the functions, try using NetShell at the command line to configure TCP/IP stack parameters and network services.
The longer a MySQL database is in use, the less you can do without it, so as your organization grows, you will eventually face the question of availability. Galera Cluster for MySQL is one possible answer.
VirtualBox is a popular virtualization choice on the desktop. In this article, we show how you can also run VirtualBox on a Linux server – with all the comforts of a graphical user interface.
For once, admins and users agree: They want more resiliency and higher bandwidth on the network. Link aggregation, in line with IEEE 802.1ax b-2008, offers both – with some minor restrictions.
The well-known free backup solutions Bacula and Amanda now have some competition. Burp, Obnam, and Backshift are three promising newcomers that impress with interesting features.
Running an IRC server might seem almost anachronistic, but the classic service from the early 1990s offers a huge amount of functionality with very little in the line of resources. In the daily grind at the office, IRC supports simple communications at a distance.
A honeypot is a specialized security tool that pretends to be an ordinary system to attract and identify attackers. Experienced intruders, however, are not so easily fooled. An experimental new technology known as HoneypotMe moves honeypot functionality to real systems on the production network.
IPv6 is establishing itself in everyday IT life, and all modern operating systems from Windows, through Mac OS X, to Linux have it on board; but if you let IPv6 introduce itself into your environment, you could be in for some unpleasant surprises.
Compiling and testing newly written code is one thing. But, creating an entire RPM package to be able to install the software cleanly on the test systems is something quite different. Jenkins helps minimize this work.