Home > Topics

Articles

How to Deliver a Unified Mobile Device Management Solution with Windows Intune
This appendix from System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager (SCCM) Unleashed explains the genesis of Windows Intune, its history, licensing, and architecture for integrating with System Center 2012 R2 Configuration Manager to deliver a unified mobile device management solution.
Continue reading...
By Kerrie Meyler, Dan Andersen, Greg Ramsey, Jason Sandys, Panu Saukko, Kenneth van SurksumSep 23, 2014
What You Really Need to Know About Dropbox
Dropbox offers free cloud-based storage for personal use, with highly affordable options for commercial use. But sharing files via Dropbox comes with some interesting gotchas, especially when large volumes of data are involved or when files are shared by many users. Learn how to handle these gotchas with dispatch and aplomb, and avoid potential loss of access to important files or content.
Continue reading...
By Ed Tittel, Kim LindrosSep 23, 2014
The Practice of Cloud System Administration: Operations in a Distributed World
This chapter from The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems, Volume 2 starts with some operations management background, then discusses the operations service life cycle, and ends with a discussion of typical operations work strategies.
Continue reading...
By Thomas A. Limoncelli, Strata R. Chalup, Christina J. HoganSep 22, 2014
Introducing NoSQL and MongoDB
In this chapter from NoSQL with MongoDB in 24 Hours, Sams Teach Yourself, learn about the design considerations to review before deciding how to implement the structure of data and configuration of a MongoDB database. You'll also learn which design questions to ask and then how to explore the mechanisms built into MongoDB to answer those questions.
Continue reading...
By Brad DayleySep 18, 2014

See More Articles

Blogs

Brad YaleThe 10 Most Important Linux Commands

I get it. 

You're new to the Linux Command Line and truth be told, you might be a little intimidated. Coming from the comfort of a PC or Mac desktop, the Linux Command Line (CLI) looks nothing like what you normally use. The Linux CLI is dark, it's secretive, it's bare bones minimal and it's anything but friendly to newcomers. And yet, the Linux CLI is highly useful, essential to using your Linux box or virtual machine and can, if done right, provide you with more insight and practical use than the Windows or Mac desktop ever could.

For those reasons, from someone who was also once a Linux newb, I present the top ten Linux CLI commands you need to master for basic Linux CLI comprehension.

This list will not make your a Linux System Admin however it will get you on your way with your foot in the ocean.

Continue reading...
By Brad YaleCommentsYesterday
Topics: Information Technology,Open Source,Linux/UNIX/Open Source,Linux/UNIX/Open Source Operating Systems,Operating Systems, Server
John  TraenkenschuhWhich new phone is best?

How do you evaluate the many new mobile device choices?

Continue reading...
By John TraenkenschuhCommentsSeptember 21, 2014
Topics: Windows Phone,iOS,Networking,Data,Mobile Application Development & Programming,Android,HTML5 & Web Standards,Business Applications,Business & Management
John  Traenkenschuh1830 wasn't so long ago

My family and I had a meal in Pigeon Forge, in an old mill building that's quite old, in an area settled in 1830.  Walking in with a MacBook Pro certainly seemed odd to some, but no one noticed my phone offering tethering rights.  And so it was that I posted a blog in a building that dated back 160 or more years ago.

Continue reading...
By John TraenkenschuhCommentsSeptember 18, 2014
Topics: Access,Information Technology,Engineering,Data,Global Business,Communications Engineering,Business & Management
John  TraenkenschuhIโ€™m ready, but the United Stateโ€™s infrastructure is not.

I’m outside the Cades Cove visitor’s center, hearing acoustical instruments like bangos and hammered dulcimers play.  I have my MacBook Pro, alive—charged and ready.  My phone is charged and ready and has a tethering plan, just begging to be used.

I am signal-less.

Continue reading...
By John TraenkenschuhCommentsSeptember 17, 2014
Topics: Access,Data

See More Blogs

Other Topics

Business & ManagementBusiness ApplicationsFinance & InvestingGeneral BusinessGlobal BusinessHuman ResourcesInformation ManagementManagement & StrategyPersonal DevelopmentSales & MarketingCertificationCisco CertificationCCDACCDPCCIECCIPCCNACCNPCCNP Security / CCSPCCNP Voice / CCVPCisco Qualified SpecialistCisco Networking AcademyCompTIAA+Network+Security+Microsoft CertificationMCADMCSAMCSDMCSEOther ITOther Non-TechnicalCloud Computing & VirtualizationDataAccessBusinessObjects/Crystal ReportsData Analytics and VisualizationDB2FileMakerInformation ManagementLotusMySQLSAPSQLSQL ServerEngineeringChemical EngineeringCommunications EngineeringGeneral Engineering & HardwareSemiconductor TechnologiesSix Sigma and Process ImprovementGraphics & Web DesignDreamweaver & FlashMicrosoft Expression StudioPhotoshop & AdobeVideo EditingHardwareUpgrading & RepairingHome & Office ComputingAppleeBay/Yahoo/GoogleEntertainment/Gaming/GadgetsHome NetworkingMac OS XMicrosoft ApplicationsMicrosoft Windows DesktopMicrosoft Windows ServerMicrosoft Windows Vista & Home ServerOther ApplicationsThe Web/Virtual Worlds/Social NetworkingInformation TechnologyMobile Application Development & ProgrammingAndroidHTML5 & Web StandardsiOSWindows PhoneNetworkingHome NetworkingNetwork Administration & ManagementNetwork Design & ArchitectureRouting & SwitchingStorageVoice/IP CommunicationsWireless/High Speed/OpticalOpen SourceAjax & JavaScriptLinux/UNIX/Open Source Operating SystemsPerlPHPPythonRuby/Ruby on RailsOperating Systems, ServerLinux/UNIX/Open SourceMAC OS X/OtherMicrosoft ServersMicrosoft System CenterMicrosoft Windows DesktopMicrosoft Windows Vista & Home ServerSolarisProcess ImprovementProgrammingAjaxAlgorithmsAndroidASP .NETC#C/C++GamesGeneral Programming/Other LanguagesGraphic ProgrammingHTML5/CSS/BlendJavaJavaScriptLotus Notes/Domino/XPagesMac and iOS ProgrammingPerlPHPPythonRationalRubyUser Interface (UI)Visual BasicVisual StudioWindows ProgrammingSecurityGeneral Security and PrivacyNetwork SecuritySoftware SecuritySoftware Development & ManagementAgileArchitecture and DesignManagement: Lifecycle, Project, TeamObject TechnologyRationalTestingUMLWeb DevelopmentAjax and JavaScriptASP.NETContent Management SystemsDreamweaver & FlashHTML/CSSMicrosoft Expression StudioPerlPHPPythonRuby/Ruby on RailsWeb ServicesCloud ComputingSOAWebSphereXML