Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
By the time the annual 2016 Red Hat Summit was held at the end of June in San Francisco, the previously announced support for .NET applications on Red Hat Enterprise Linux had been implemented. We take a closer look at the implementation and how admins can create a .NET environment under Linux.
POSIX attributes are permanently connected to a user account, and they help identify the user; however, this permanent connection can lead to difficulties when migrating from one identity management system to another. ID Views help you make migration go smoothly.
The Veeam Agent for Linux is not open source, but it offers a professional solution free of charge for local and remote backup and recovery of files, folders, volumes, and even complete systems in the local network and on servers in the cloud.
Vagrant software makes it possible to set up a development environment quickly and efficiently. The Container Development Kit takes advantage of this feature to create a container-based environment built on Red Hat Enterprise Linux under Windows, Mac OS X, or Linux.
Microsoft has extended the failover options for Hyper-V in Windows Server 2016 to include two new cluster modes, as well as the ability to define an Azure Cloud Witness server. We look at how to set up a Hyper-V failover cluster.
Windows Server 2016 takes a big step toward software-defined networking, with the Network Controller server role handling the centralized management, monitoring, and configuration of network devices and virtual networks. This service can also be controlled with PowerShell and is particularly interesting for Hyper-V infrastructures.
Redfish has been slated to replace the Intelligent Platform Management Interface (IPMI) for hardware management over the network. We explain how the Redfish standard works and how it is used for system management.
Upgrading domain controllers or installing new servers can cause problems with name resolution, Active Directory replication, and Group Policy. A coordinated approach can isolate these errors in Windows Server 2008 or newer.