• STONITH (Shoot The Other Node In The Head)

    STONITH (Shoot The Other Node In The Head) is a Linux service for maintaining the integrity of nodes in a high-availability (HA) cluster.

    Margaret Rouse23,605 pointsBadges:
  • Performing an automated Ubuntu install using preseeding

    When performing an automated Ubuntu install, preseeding is an integral part of the process. Learn the different variables and settings necessary for a basic preseed configuration.

    ITKE435,880 pointsBadges:
  • What version of Linux is currently deployed on your data center servers?

    svanvugt1,425 pointsBadges:
  • SLES 12 anchored in enterprise Linux server availability

    SUSE's latest version of its enterprise Linux server OS defaults to Btrfs, with several features targeting always-on service.

    svanvugt1,425 pointsBadges:
  • Problems to prep for when running Linux VMs in Hyper-V

    Learn how to prepare for some of the problems you may have to work around if you run dynamic memory in a Red Hat Linux VM under Hyper-V.

    SteveBige017,530 pointsBadges:
  • Top IT news stories from IBM, Dell and Red Hat

    Did you miss what happened at Dell, IBM and other major tech vendors so far in 2014? Here are the top five data center news stories to keep you in the loop.

    szaharoff485 pointsBadges:
  • Linux desktop interoperability: MS Office and OpenOffice

    The latest release of OpenOffice v3 has improved interoperability with Linux, Windows and MS Office. The more viable OpenOffice is, the more viable Linux is in general. The ultra-cheap Linux-based notebooks also now enable Linux to fit into the familiar world of PCs and Macs.

    ITKE435,880 pointsBadges:
  • KSM (kernel samepage merging)

    KSM (kernel samepage merging) is a Linux kernel feature that allows the KVM hypervisor to share identical memory pages among different process or virtual machines on the same server.

    Margaret Rouse23,605 pointsBadges:
  • In Heartbleed’s wake, Bash shell flaw puts Linux, Mac OS users at risk

    Experts say a 20-year-old vulnerability uncovered in the Bash shell, found in Unix-based operating systems including Linux and Mac OS, could lead to a dangerous worm outbreak unlike anything seen in more than a decade.

    Brandan1,125 pointsBadges:
  • Working with configuration files in Linux systems

    Read how to find and edit configuration files in your customers' Linux systems by using the shell commands provided in this chapter excerpt.

    SearchITChannel1,890 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following