Connect with:

Category: CommunityThe Monthly Round-Up: August’s Best System Administration, Hosting, Security, and Enterprise IT Content

DATA CHORDS

Photo Credit: Beraldo Leal

The kids are back in school and, for all intensive purposes, summer is now over. While you’ve been enjoying your time off, the world has continued to turn and the news has kept breaking. Knowing you might have missed an important story or two, we’ve gathered the best System Administration, Hosting, Security, and Enterprise IT content from August into one convenient location. Let us know what you think in the comment section and don’t forget to follow us on Facebook, Twitter, and Google+, where we share the best content that we come across every day.

System Administration

Python Comprehensions for SysAdmins - Sysadmins who seldom need to read Python code may come to a screeching halt when they encounter comprehensions. This article introduces these Python constructs and shows how to interpret them.

20 Tips and Tricks Any MySQL Database Developer Should Consider – Since its introduction in 1995, MySQL quickly became the world’s most popular database management system. With that type of popularity comes great responsibility…and countless improvements, updates, and fanciful tricks.

NSA Cuts 90% Of System Admin Jobs - In an effort to reduce the risk of unauthorized leaks, the National Security Agency plans to eliminate most of its system administrator positions.

Limiting Systems Administrators’ Access - In the wake of the National Security Agency Leak by former NSA contractor Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems?

A Git Primer for Sysadmins - I am writing this post with the intention of giving readers (and other sysadmins) that are unfamiliar with Git a brief introduction to get up and running as quickly as possible. There are numerous guides out there but none I have found so far with the spin of getting things working quickly for system administrators.

Quick Tips For Linux Administrators - The first time you use sudo on a Linux system, it quotes the famous line from Spiderman: “with great power comes great responsibility.” Using your power responsibly can be challenging on a system as powerful as Linux, where one typo can turn an ordinary rm command into a command which removes your root directory.

Do You Sudo? Learn the Basics - Using sudo is a good idea that has been around for decades, but it’s only in the last few years that it’s caught on as an alternative to logging in as root. Using sudo is such an improvement that some Linux distributions, such as Amazon’s Linux-based VMs, have made it compulsory

Enterprise IT

The Future Of Enterprise IT Is In The Cloud - Your business should be looking to cloud computing for its future IT platforms. The cloud is vital to your competitiveness. Whether it’s a public cloud, a private cloud or other hosting arrangement, the philosophies behind cloud computing can no longer be seen as “just a fad.”

A Brief History of Disruption: Technologies that Upended Enterprise IT - “Smaller but cleaner.” That’s one of the predictions voiced in I Think We’re All Bozos on This Bus, the 1971 album by comedic legends the Firesign Theatre. “Bozos” describes a dystopian future in which the president of the United States is powered by a mainframe successfully hacked by the hero—cutting-edge technology for the era.

Best Practice Linux Guide: Hybrid Clouds - ‘The Cloud’ was once a nebulous place on flow charts where developers could shunt data and carry out routine operations before bringing it back into the real world application they were creating.

Apple and the Enterprise: A Complicated Relationship - When Microsoft shipped Windows 2000 and Active Directory, Apple didn’t really have a solution for identity management or for linking Macs to an enterprise network. The company was just beginning the transition from its classic Mac OS—the first version of which had shipped on the first Mac in 1984—to OS X.

How BYOD Drives Enterprise Content Management and Collaboration Evolutions - We’ve been talking about BYOD on several blogs, from a policy, people and technology perspective since quite some time. BYOD is increasingly getting debated in enterprise content management (ECM), collaboration, marketing automation and marketing/business in general too.

Public Sector Moves More Mission Critical Data on to the Cloud – Verizon - More agencies and offices are moving their mission critical data on to the cloud according to the latest data from Verizon Enterprise Solutions. The report “State of the Enterprise Cloud,” shows that between January 2012 and June 2013, cloud based storage has increased by 90% and cloud based memory has increased by 100%.

Why JavaScript Will Become The Dominant Programming Language Of The Enterprise - There is no denying that since its inception in the mid 90’s, JavaScript has become one of the most popular Web development languages. In September 2012, industry analyst firm, RedMonk, showed it as the top language.

Hosting

How to Pick the Right Hosting Company for Your Startup - So you’ve got a great idea for an online business model and now you’re ready to take action by setting up a website. The challenge you face, of course, is the same one faced by all entrepreneurs who are starting a new website: how do you select the right hosting company?

Busting The Myth Behind ‘Unlimited’ Web Hosting - If you are looking for shared web hosting, chances are, you will not have a hard time finding potential web hosts for your website. In fact, you will, most likely, end up facing a ‘Problem of Plenty’. Yes, there are way too many hosts out there who specialize in shared web hosting.

Security

Passwords Won’t Die. Should They? – Let’s go back for a minute to 1994, when an external floppy disk drive cost you $500 and a 2MB digital camera the size of a textbook set you back $5,000. To sign in to your Prodigy account, you simply typed in your username and password in a text box, and most likely thought to yourself, “Well, that was a really easy way to log in.”

Here’s Why Your email is Insecure and Likely to Stay that Way – Email is the most ubiquitous method of communication on the Internet – maybe even on the planet. It’s built into almost everything, from phones and tablets to traditional computers to gaming devices – heck, even connected home appliances and cars can do email.

Shadow IT, Rogue Clouds and Security - Shadow IT is one of the greatest security risks that a lot of people just don’t know about. It’s actually a growing and potential threat to security in enterprise after enterprise. If you don’t know what Shadow IT is – that’s when IT systems seep into production without prior approval from the organization.

Practicing Safe BYOD: Is Your Data at Risk? - Over the next few years, we’re going to see the ad hoc use of personal devices in the workplace transform into a cohesive, total mobile experience that unites data across every device. In the long run, this bring-your-own-device (BYOD)-enabled workplace will be a boon for employee productivity and collaboration.

We’ll leave you with this absolutely amazing undertaking by xkcd.com, “XKCD #1190 – Time: The Animated Film.”

Enterprise ITHostingMonthly RoundupSecuritySystem Administration
Sep 3, 2013, 2:26 pmBy: Ben Ustick (0) Comments

Leave a Reply
Surround code blocks with <pre>code</pre>

Connect with:

Your email address will not be published.

Email marketing powered by MailChimp

Newsletter

Sign up to receive periodic InterWorx news, updates and promos!

New Comments

Current Poll

  • This field is for validation purposes and should be left unchanged.

Forum Posts