- Metropolitan Area Sun Ray Services
- Aug 9, 2002
- Expand into new lines of business and drastically reduce the actual and hidden costs of ownership of the desktop PC device by implementing these preferred practice recommendations for deploying Sun Rays over a Metropolitan Area Network.
|
- Migrating to the Solaris Operating System: Migrating From Tru64 UNIX
- Feb 6, 2004
- This article presents a fictional case study that illustrates the methodology, tools, and best practices used to migrate a Tru64 environment to a Solaris environment.
|
- Migrating to the Solaris Operating System: Migration Strategies
- Oct 31, 2003
- This article defines the most important terms in migration, and differentiates between these terms. In addition, it presents migration strategies, the benefits and risks of each strategy, and the appropriateness of each strategy for various situations.
|
- Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems, Part I
- Oct 17, 2003
- This article is the first part of a two-part series that provides information and recommendations for minimizing domains for Sun Fire V1280, Midframe, 12K, and 15K systems.
|
- Minimizing Domains for Sun Fire V1280, 6800, 12K, and 15K Systems, Part II
- Oct 24, 2003
- This article provides information and recommendations for minimizing domains for the Sun Fire V1280, Midframe, 12K and 15K systems.
|
- Minimizing the Solaris Operating Environment for Security: Updated for Solaris 9 Operating Environment
- Feb 7, 2003
- This article provides tips, instructions, and preferred practices for minimizing the Solaris Operating Environment to increase system security.
|
- Network Storage Evaluations Using Reliability Calculations
- Aug 16, 2002
- This article uses a case study to introduce concepts and calculations for systematically comparing redundancy and reliability factors as they apply to network storage configurations.
|
- Networked System Administration Tools from Sun Microsystems
- May 1, 2002
- Solaris system administration expert Janice Winsor discusses the Solaris Management Console tools and shows you how they help you manage and administer a Solaris server from almost anywhere.
|
- Performance Oriented System Administration For Solaris
- May 23, 2003
- This article explains the algorithms and heuristics surrounding the most important UNIX tunables and describes several kernel tunables and the algorithms behind them.
|
- Planning for the Development of Sun Cluster Agents
- Jun 10, 2005
- As with any development project, you need to do a little planning before creating an agent. In particular, you must understand the capabilities of the application in question, and define the scope of the project. This sample chapter will help you get started planning for your new agent.
|
- Preparing for Solaris 9 Installation
- Sep 20, 2002
- This sample chapter introduces basic Solaris installation considerations, including some background on how Solaris, disks, memory, and networking slot together.
|
- Q & A with the Authors of "UNIX and Linux System Administration Handbook"
- Jul 28, 2010
- Matthew Helmke talks to the authors of UNIX and Linux System Administration Handbook about their new book, interacting with readers, and whether after 4 editions they consider themselves sysadmins or authors.
|
- RBAC in the Solaris™ Operating Environment
- Sep 7, 2001
- Role-based access control (RBAC) is an alternative to the all-or-nothing superuser model. RBAC is in keeping with the security principle of least privilege, which states that no user should be given more privilege than necessary for performing that person's ...
|
- Reducing the Backup Window With Sun StorEdge Instant Image Software
- Aug 30, 2002
- This article discusses the advantages and methods of using a point-in-time (PIT) type of backup system versus a more traditional backup approach that requires extended downtime.
|
- Responding to a Customer's Security Incidents, Part 4: Processing Incident Data
- Jan 9, 2004
- This fourth article focuses on authenticating, preserving, and processing the incident data. Only the salient points for best practices that should be executed in processing the incident data are discussed.
|
- Responding to Customer's Security Incidents—Part 2: Executing a Policy
- Aug 22, 2003
- This article is the second in a series that discusses a policy of security incident responses.
|
- Responding to Customer's Security Incidents, Part 1: Establishing Teams and a Policy
- Aug 15, 2003
- This article is the first of a series of articles that discuss building teams, establishing a security incident response policy, and executing it.
|
- Responding to Customer's Security Incidents--Part 3: Following Up After an Incident
- Oct 31, 2003
- The third in a five-part series, this article focuses on following up after an incident and presents the best practices that should be executed in the follow-up phase.
|
- Role Based Access Control and Secure Shell—A Closer Look At Two Solaris Operating Environment Security Features
- Sep 12, 2003
- This article introduces and explains two security features in the Solaris operating environment.
|
- Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables
- Jan 30, 2004
- This article provides information and recommendations for securing Linux operating systems with host-based firewalls.
|