Featured Book

A Practical Guide to Ubuntu Linux, 4th Edition

A Practical Guide to Ubuntu Linux, 4th Edition

Mark Sobell's A Practical Guide to Ubuntu Linux, Fourth Edition, is the most thorough and up-to-date reference to installing, configuring, securing, and working with Ubuntu desktops and servers. This edition has been fully updated for Ubuntu 14.04 (Trusty Tahr), a milestone LTS (Long Term Support) release, which Canonical will support on both desktops and servers into 2019. Sobell walks you through every essential feature and technique, from installing Ubuntu to working with the latest Ubuntu Unity desktop, and from configuring servers and monitoring networks to handling day-to-day system administration.

Articles

Building Blocks for Data Center Cloud Architectures
This chapter from The Policy Driven Data Center with ACI: Architecture, Concepts, and Methodology describes the components of a cloud infrastructure and how ACI provides network automation for the cloud. It also explains the Amazon Web Services approach; covers the role of the various orchestration tools; introduces some key concepts on how to automate the provisioning of servers and how to get started with OpenStack; explains the OpenStack modeling of the cloud infrastructure; and discusses the administrator’s task of mapping the requirements of IaaS services onto the models of these technologies.
By Lucien Avramov, Maurizio Portolani - Jan 26, 2015
How Codes of Conduct Encourage Best Behavior at Technology Conferences
Technology can be a great equalizer, but unfortunately many venues still suffer from the typical challenges that accompany a diversification of power: harassment, bullying, and general bad behavior. Technology conferences have had their share of those problems. Thankfully, many good organizations are getting behind the idea of encouraging best behavior by instituting codes of conduct. Review a sample code of conduct and learn what makes a good, complete one, why you should want one at the next conference you attend, and why they matter.
By Thursday Bram - Jan 26, 2015
Video: Predictive Analytics with Excel: Smoothing Constant and Exponentiation
In this excerpt from Predictive Analytics with Excel LiveLessons (Video Training), Downloadable Video: Exponential Smoothing and Autoregression, Conrad Carlberg takes a look a exponential smoothing.
By Conrad Carlberg - Jan 23, 2015
A Practical Guide to Ubuntu Linux: The Shell
This chapter from A Practical Guide to Ubuntu Linux, 4th Edition takes a close look at the shell and explains how to use some of its features. It discusses command-line syntax and describes how the shell processes a command line and initiates execution of a program. This chapter also explains how to redirect input to and output from a command, construct pipelines and filters on the command line, and run a command in the background. The final section covers filename expansion and explains how you can use this feature in your everyday work.
By Mark G. Sobell - Jan 22, 2015
Getting Started with the Apple WatchKit
Buzz keeps growing around the Apple Watch, scheduled for release in early 2015. Will your apps be ready? Grab Apple's new WatchKit (released November 18) and speed-read Wei-Meng Lee's instructions on using these new tools to gear up your programming as the time winds down to arrival of the Watch.
By Wei-Meng Lee - Jan 22, 2015
See All Articles

Blogs

Windows 7: How To Delete Item Not Found Using CMD

Every operating system contains errors. One of the more common errors found within Windows OS's is the "item not found" or the "file not found" error. The error typically shows itself when a user tries to delete a file only to find it cannot be deleted when prompted with the following error message: "Could Not Find This Item: This Is No Longer Location in {insert_directory_here}. Verify the item's location and try again."

Well, for those of you who want to delete the file without verifying the item location, below is a quick video tutorial showing you how to delete the item in question. 

By Brad Yale - Jan 22, 2015 - Home & Office Computing, Information Technology, Operating Systems, Server, Process Improvement, Microsoft Applications, Microsoft Servers, Microsoft Windows Desktop, Microsoft Windows Desktop, Microsoft Windows Server
How to Browse the Web Privately Using a Secure SSH SOCKS Tunnel

There are times when you want to browse the web but you want to do it privately, without being traced. Sure, you could go ahead and utilize the incognito feature built into most major web browsers however to truly browse in anonymity, there is nothing better than utilizing a secure SSH SOCKS Tunnel. In this quick "how-to", we are going to show you how to set up a secure SSH Socks Tunnel enabling you to route all your web traffic through your host.  

By Brad Yale - Jan 16, 2015 - Home & Office Computing, Information Technology, Microsoft Windows Desktop, Operating Systems, Server, Networking, Open Source, Security, General Security and Privacy, Home Networking, Home Networking, Linux/UNIX/Open Source, Network Administration & Management, Network Design & Architecture, Network Security, Routing & Switching
See All Blogs

Who is InformIT

We are the online presence for the world's leading technology publishers and your source for reliable and qualified content to help you do your job better.

Learn More About InformIT


Our Imprints


Become a Reviewer

Provide valuable feedback and suggestions on current and new releases from us. Learn more.