Connect with:

Category: CommunityThe Monthly Round-Up: December’s Best System Administration, Hosting, Security, and Enterprise IT Content

man on bench

Photo Credit: Thomas Rousing

It’s been an important year for system administrators and the web hosting industry in general. There’s been a lot of discussion about the cloud, the enterprise, the future of the data center, and don’t forget, security. In that spirit, we’ve gathered up our favorite System Administration, Hosting, Security, and Enterprise IT content from December for your convenience. Let us know if we missed anything notable in the comment section and don’t forget to follow us on Facebook, Twitter, and Google+, where we we’ll share the same great content in 2014.

System Administration

Day 1 – System APIs - One article for each day of December, ending on the 25th article. With the goals of of sharing, openness, and mentoring, we aim to provide great articles about systems administration topics written by fellow sysadmins.

One Workload Per Virtual Machine - Back when the computing world was built on bare metal we often tried to squeeze more than one workload on a physical machine. We did this to save money. Servers are expensive so we wanted to make the most of each one. What we didn’t account for was how complicated things could get.

13 New Year’s Resolutions for Every SysAdmin - As the year comes to an end and New Year’s Day is right around the corner, everyone starts to think about their resolutions for the New Year.

Partitioning MongoDB Data on the Fly - Let’s say you start a project with MongoDB. It is (and probably should be) simple and small. It starts getting some traction and expands. Your single server is now behind a load balancer and your EC2 instance sizes are getting larger and larger.

Protect Your Ports with a Reverse Proxy - In a previous article, I discussed Apache Tomcat, which is the ideal way to run Java applications from your server. I explained that you can run those apps from Tomcat’s default 8080 port, or you can configure Tomcat to use port 80.

Affecting Change or Knowledge Workers as a Political Class? - In my heart of hearts, I’m apolitical. In an ideal world, I just wouldn’t care about the political dealings on a national scale, and I used to look at shows like Meet the Press as the equivalent of E!TV – Sunday morning gossip shows talking about things that I don’t care about.

Enterprise IT

Embracing the New Enterprise IT: The Public Cloud - Cloud this and cloud that are on the lips of every IT professional. Beyond being an overhyped buzzword, cloud computing is a technology that’s innovating the way that many businesses, from startups to enterprises, handle their IT needs.

Using Cloud Computing for Big Data Management - So you’ve probably heard about how the cloud can be leveraged for managing big data, but how exactly can you do that? Well, there are a variety of service options available in order to achieve many business goals that you may not be able to accomplish practically with other solutions.

The IT Department Is Dead. Long Live the IT Department - Evernote CEO Phil Libin sounds like a lot of tech executives when he advocates for treating employees well. It’s not just a nice thing to do, he says, it’s an important business strategy. “You can’t beat more productivity out of knowledge workers,” he says.

The Log: What Every Software Engineer Should Know About Real-time Data’s Unifying Abstraction - I joined LinkedIn about six years ago at a particularly interesting time. We were just beginning to run up against the limits of our monolithic, centralized database and needed to start the transition to a portfolio of specialized distributed systems.

Software May Be Eating The World, But Open Source Software Is Eating Itself - Software may be eating the world, as Marc Andreessen posits, but open-source software seems to be eating itself. And at a far faster clip.

4 Cloud Storage Predictions for 2014 - I’ve been involved in the enterprise storage industry since 2000, first as a buyer/end-user at Loudcloud, then as a vendor at EMC, and finally as an independent analyst. The dynamics in the cloud storage market have eerie similarities to the intense competition between EMC, Hitachi Data Systems, NetApp, and Veritas circa 2001.

10 Ways Modern Enterprise Performance Management is Changing Businesses - “This data is 90 days old, but that’s okay.” When was the last time you heard a C-level executive say that? My guess is it’s been a while, because these days, if you don’t have real-time access to the data that drives your business, it’s all but impossible to arrive at meaningful results that help you grow and compete.

Hosting

Want to Reduce Your Cloud Costs 70 percent? Here’s How - Colocation, which means buying your own hardware up front and running and managing it in a third-party site,  is not usually seen as a cheaper alternative to cloud. But, oddly enough, it can be.

Bitcoin Mining Arms Race Boosting Interest in Liquid Cooling - There’s a computing arms race going on in the world of Bitcoin. Interest in the digital crypto-currency is driving the development of specialized hardware chips, which are selling out almost as fast as they can be built.

What Web Hosts Should Be Doing in 2014 – Marketing Edition - Marketing is always evolving and changing. What works today may not work tomorrow and as new software, apps, and social media brands emerge and die out it’s always important to make sure you keep up and not fall behind.

Security

2014: A Tipping Point for Password Authentication  - Is 2014 the year the password passes away? Or will it limp along for another few years as a once-useful but increasingly inadequate identification system?

My First 5 Minutes On A Server; Or, Essential Security for Linux Servers - Server security doesn’t need to be complicated. My security philosophy is simple: adopt principles that will protect you from the most frequent attack vectors, while keeping administration efficient enough that you won’t develop “security cruft.”

What a Successful Exploit of a Linux Server Looks Like - Like most mainstream operating systems these days, fully patched installations of Linux provide a level of security that requires a fair amount of malicious hacking to overcome.

Web Security Star Prevoty Raises $2.4M Seed Extension, Continues its Crusade Against XSS Attacks - For website administrators, the internet is a dangerous place full of would-be attackers and trouble makers. But for all the attention paid to Web security, the standard solutions like Web-application firewalls (WAF) are only capable of preventing known attack vectors.

This month, we’ll end with a stunning time lapse video of Earth shot from the International Space Station (ISS). Enjoy!

Enterprise ITHostingMonthly RoundupSecuritySystem Administration
Jan 7, 2014, 12:21 pmBy: Ben Ustick (0) Comments

Leave a Reply
Surround code blocks with <pre>code</pre>

Connect with:

Your email address will not be published.

Email marketing powered by MailChimp

Newsletter

Sign up to receive periodic InterWorx news, updates and promos!

New Comments

Current Poll

  • This field is for validation purposes and should be left unchanged.

Forum Posts