Home > Articles > Operating Systems, Server > Solaris

Solaris

150 Items

Sort by Date | Title

Metropolitan Area Sun Ray Services
Aug 9, 2002
Expand into new lines of business and drastically reduce the actual and hidden costs of ownership of the desktop PC device by implementing these preferred practice recommendations for deploying Sun Rays over a Metropolitan Area Network.
Migrating to the Solaris Operating System: Migrating From Tru64 UNIX
Feb 6, 2004
This article presents a fictional case study that illustrates the methodology, tools, and best practices used to migrate a Tru64 environment to a Solaris environment.
Migrating to the Solaris Operating System: Migration Strategies
Oct 31, 2003
This article defines the most important terms in migration, and differentiates between these terms. In addition, it presents migration strategies, the benefits and risks of each strategy, and the appropriateness of each strategy for various situations.
Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems, Part I
Oct 17, 2003
This article is the first part of a two-part series that provides information and recommendations for minimizing domains for Sun Fire V1280, Midframe, 12K, and 15K systems.
Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems, Part II
Oct 24, 2003
This article provides information and recommendations for minimizing domains for the Sun Fire V1280, Midframe, 12K and 15K systems.
Minimizing the Solaris Operating Environment for Security: Updated for Solaris 9 Operating Environment
Feb 7, 2003
This article provides tips, instructions, and preferred practices for minimizing the Solaris Operating Environment to increase system security.
Network Storage Evaluations Using Reliability Calculations
Aug 16, 2002
This article uses a case study to introduce concepts and calculations for systematically comparing redundancy and reliability factors as they apply to network storage configurations.
Networked System Administration Tools from Sun Microsystems
May 1, 2002
Solaris system administration expert Janice Winsor discusses the Solaris Management Console tools and shows you how they help you manage and administer a Solaris server from almost anywhere.
Performance Oriented System Administration For Solaris
May 23, 2003
This article explains the algorithms and heuristics surrounding the most important UNIX tunables and describes several kernel tunables and the algorithms behind them.
Planning for the Development of Sun Cluster Agents
Jun 10, 2005
As with any development project, you need to do a little planning before creating an agent. In particular, you must understand the capabilities of the application in question, and define the scope of the project. This sample chapter will help you get started planning for your new agent.
Preparing for Solaris 9 Installation
Sep 20, 2002
This sample chapter introduces basic Solaris installation considerations, including some background on how Solaris, disks, memory, and networking slot together.
Q & A with the Authors of "UNIX and Linux System Administration Handbook"
Jul 28, 2010
Matthew Helmke talks to the authors of UNIX and Linux System Administration Handbook about their new book, interacting with readers, and whether after 4 editions they consider themselves sysadmins or authors.
RBAC in the Solaris™ Operating Environment
Sep 7, 2001
Role-based access control (RBAC) is an alternative to the all-or-nothing superuser model. RBAC is in keeping with the security principle of least privilege, which states that no user should be given more privilege than necessary for performing that person's ...
Reducing the Backup Window With Sun StorEdge Instant Image Software
Aug 30, 2002
This article discusses the advantages and methods of using a point-in-time (PIT) type of backup system versus a more traditional backup approach that requires extended downtime.
Responding to a Customer's Security Incidents, Part 4: Processing Incident Data
Jan 9, 2004
This fourth article focuses on authenticating, preserving, and processing the incident data. Only the salient points for best practices that should be executed in processing the incident data are discussed.
Responding to Customer's Security Incidents—Part 2: Executing a Policy
Aug 22, 2003
This article is the second in a series that discusses a policy of security incident responses.
Responding to Customer's Security Incidents, Part 1: Establishing Teams and a Policy
Aug 15, 2003
This article is the first of a series of articles that discuss building teams, establishing a security incident response policy, and executing it.
Responding to Customer's Security Incidents--Part 3: Following Up After an Incident
Oct 31, 2003
The third in a five-part series, this article focuses on following up after an incident and presents the best practices that should be executed in the follow-up phase.
Role Based Access Control and Secure Shell—A Closer Look At Two Solaris Operating Environment Security Features
Sep 12, 2003
This article introduces and explains two security features in the Solaris operating environment.
Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables
Jan 30, 2004
This article provides information and recommendations for securing Linux operating systems with host-based firewalls.

<< < Prev Page 2 3 4 5 6 Next >