Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Using CICS event monitoring points (EMPs) for tuning and debugging
Event monitoring points (EMPs), part of the CICS monitoring facility (CMF), allow for detailed data gathering when the CMF isn't enough. With EMPs, you can insert personalized code into CMF for application-specific tuning or debugging. This tip ... Continue Reading
Creating an installation server for SUSE Linux Enterprise Server
When installing multiple SUSE Linux Enterprise servers, using an installation server can facilitate the process. This tip details how to create an installation server for SUSE Linux Enterprise Server 10. Continue Reading
Build your own iSCSI SAN appliances, save money
An open source storage area network (SAN) is a flexible, highly redundant failover option for the budget-conscious. But consider requirements like iSCSI, DRBD and monitoring software Continue Reading
-
Solaris system performance tuning
Solaris 10 systems need tuning and optimization in order to give the best performance given a certain system configuration and workload. The methods mentioned here are applicable to earlier Solaris versions and some other UNIX-based operating ... Continue Reading
Implementing CICS managed data tables
CICS has an I/O buffering technique that is well-suited for small referential datasets, known as CICS managed data tables. Learn which datsets work best, and how to implement CMDTs on your system. Continue Reading
How to use Unix file system snapshots
File system snapshots are a great Unix systems administration tool. Learn how to use them to copy database files with minimal downtime.Continue Reading
Uninterruptible power supply load bus synchronization: Yes or no?
Should you consider paying the additional cost of a Load Bus Synchronization system for your uninterruptible power supply? Data center experts Syska Hennessy weigh in.Continue Reading
Clonezilla: Not such a monster with expert guidance
If your system crashes, the image server Clonezilla on Ubuntu can circumvent time-consuming troubleshooting procedures during recovery.Continue Reading
Selecting a general contractor: Data center construction runbook, Chapter 3
When you're building a new data center, it pays to bring the general contractor onboard early, rather than bidding out the process and ending up with unqualified subcontractors on your project.Continue Reading
Settings to optimize an XFS file system
To improve system performance, explore this guide oin XFS file system program settings.Continue Reading
-
Are you prepared for the Unix 2038 problem?
All 32-bit Unix/Linux-based systems store the system clock time internally as the number of seconds since the "Epoch." The latest time and date that can be represented as seconds-since-the-Epoch in that 32-bit signed integer is 3:14:07 UTC on ...Continue Reading
Taking advantage of the CICS workload dispatch ratio
CICS and its task control blocks (TCBs) are dispatchable units of work to the system. While priority may change a task's position on the chain it usually does so at the expense of others. CICS monitoring facility (CMF) records keep track of how long...Continue Reading
How to use XFS management tools
While XFS is a valuable file management software, a strong understanding of its management tools is central to reaping its benefits. Learn how to use XFS commands from an expert.Continue Reading
Mainframes playing catch up: Open source advantages surpass traditional programming
IBM's z10 has arrived, but the company has not provided much support for open-source application use. With the rise in sophistication of open-source programs, this important part of the IT landscape is being missed. Open source development is often ...Continue Reading
CICS 3270 bridge tutorial, part 3: How to start and end a conversation
Robert Crawford explains how to link to the 3270 bridge (DFHL3270). Each explanatory step ends with an implied EXEC CICS LINK to bridge program DFHL3270. Once linked, allocate and the bridge will create a facility for target transactions to talk to....Continue Reading
Data center cooling optimization in the virtualized-server world
How many hamburgers can you cook on a blade server? If your servers are literally cooking there are a variety of systems to consider to keep your equipment cool.Continue Reading
Sys admin recommended reading: Improve your skill set
If your bookshelf is crowded with technical manuals, it might be time to make room for books that will help you develop as an IT professional. From social networking to statistics, valuable reading awaits.Continue Reading
When to use Unix or Linux?
Unix-Linux expert Ken Milberg guides you through the increasingly complex task of choosing what operating system best suits your needs.Continue Reading
CICS 3270 bridge tutorial, part 2: Using DFHL3270
According to CICS expert Robert Crawford, using DFHL3270 is not as hard as it looks.Continue Reading
Hardening SUSE Linux Enterprise Server in eight steps
With this SLES hardening guide, a secure server is only eight steps away. Follow along with our expert, who shows how to lock down a server from installation to logging events.Continue Reading
What are the top skills for systems administrators?
Do you have the skills to compete in the systems administrator job market? What are the top technical and nontechnical skills you need to get hired?Continue Reading
Installing a secure instant messaging server on Linux
Did your company ban instant messaging for security reasons? Free up email resources and bring back real-time communication with this secure IM server.Continue Reading
Monitoring CPUs to boost Linux server performance
A taxed CPU may undercut server performance. But fine-tuning Linux servers with a few simple commands may provide a remedy to lagging servers.Continue Reading
Disaster recovery runbook--Chapter One: Planning
Data center disaster recovery and business continuity are necessary components to successful data center implementations and business execs would be wise to hop on this bandwagon in an increasingly electronic world. This section of our disaster ...Continue Reading
Clarifying the GPL: Why Linux distros cannot be copyrighted
Confused about copyrights? Our expert explains how Linux can be copyrighted, but proprietary plans for Linux distributions are a pipe dream.Continue Reading
Data center site selection: Data center construction runbook, Chapter 1
Data center site selection is the first step in a data center design and construction project. This guide provides resources to find the cheapest, safest data center locations.Continue Reading
Managing hardware RAIDs with Adaptec Storage Manager and Ubuntu
Manage disaster recovery (DR) by monitoring hardware RAIDs with Adaptec Storage Manager 64-bit on Ubuntu Linux 64-bit. This tip explains how to ensure the stability and validity of your servers' storage devices with proactive DR.Continue Reading
Hash table how-tos for mainframe programmers
The idea behind hashing is to transform the table key into a number that can be used to directly access an entry. Mainframe guru Robert Crawford explains.Continue Reading
Which MQ Queue is related with which CICS transaction?
CICS expert Robert Crawford offers advice on determining the connection between CICS transactions and MQ Queue name.Continue Reading
United Parcel Service's Tier 4 data center goes green
The facilities team at United Parcel Service's data center in Alpharetta, Ga., has gotten green data center operations down to a science. Learn how they did it in this two-part case study. Here in part one, we focus on how UPS identified wasted ...Continue Reading
Comparing Unix operating system vulnerabilities
In this tip, SearchDataCenter.com looks at operating system vulnerability advisories from Secunia in 2007 for the three major Unix operating systems – AIX, HP-UX and Solaris.Continue Reading
Do dual-power supply servers increase redundancy?
Implementing servers with dual power supplies is a common practice in mission-critical environments. But improper implementation can result in a false sense of power redundancy. This tip explains what can go wrong in your data center.Continue Reading
Oracle on RHEL 5: Installation and configuration
Install and configure Oracle 10 on RHEL 5. This tip shows how to set up a database with Oracle's Database Configuration Assistant (DBCA) and Oracle Enterprise Manager.Continue Reading
Splunking with VMware and syslog on Linux
Analyze log files for VirtualCenter tasks and events with Ubuntu Linux and Splunk. Our expert walks you through download, installation and configuration of this handy application and shows you how to use it with VMware and a Linux syslog server.Continue Reading
CICS socket interface
IBM's socket interface is a faster, lower-overhead alternative to Systems Network Architecture for TCP/IP services.Continue Reading
Creating a VPN appliance with Ubuntu and Openswan
Make an enterprise-ready, scalable VPN appliance on Ubuntu Linux via Openswan with this expert's instructions.Continue Reading
SUSE Linux Enterprise troubleshooting: Fixing boot problems by repairing a broken initrd
Having a problem booting SUSE Linux Enterprise on your server? It may be that you have a problem with your initial RAM disk. Expert Sander van Vugt troubleshoots the problem with this step-by-step guide to fixing a broken initrd.Continue Reading
Using grep and sed to find and replace
Learn how to use grep and sed to search for a string of text within a file and to replace a string.Continue Reading
Security face-off: Red Hat's SELinux vs. SUSE AppArmor, others
While Red Hat seems to have cornered the SELinux market, SUSE is hoping AppArmor will be an attractive alternative. Other distributions are offering their own SELinux deployments. Expert Ken Milberg evaluates several of them and discusses Novell's ...Continue Reading
Using SETools to manage SELinux policies
SETools can help SELinux administrators with the daunting task of writing, managing and reporting on policies with the help of tools such as apol, sediff, seaudit and sechecker. Our expert shows you how to setup SETools on your system and introduces...Continue Reading
Data center disaster recovery considerations checklist
Data center disaster recovery planning expert Bill Peldzus discusses IT staffing, infrastructure issues, operations planning and more in this data center disaster recovery checklist.Continue Reading
Managing Software on Ubuntu Server Edition
Ubuntu Server Edition's package management utilities can be intimidating but can be easily navigated at the command line and with Synaptic's GUI package manager.Continue Reading
Data center cooling and humidity control: CRAC or AHU?
Data center physical environment expert Robert McFarlane discusses the best temperature and humidity control choices for a reader's data center.Continue Reading
Red Hat Enterprise Linux 5 performance tuning: Monitoring and maximizing your system
Contributor Ken Milberg explains how to optimize Red Hat Enterprise Linux 5 to yield great results without jeopardizing your system.Continue Reading
Linux-to-Unix migrations: Why, when and how to make the move
Porting from Linux to Unix is not as common as the inverse, but there are reasons for making the move. In this tip, learn how to make the migration successful.Continue Reading
How do I send email from UNIX machines to a corporate mail ID?
How to run the reiser file system
How to use SSH Public/Private keys in PuTTY
In this article, you'll learn how to make communication between Linux Server and PuTTY more secure by using SSH public/private keys.Continue Reading
Data center facility control systems
Data centers are mission-critical environments with serious consequences for failure, but many employ the same commercial-style control systems as office buildings. Contributor Steve Blaine discusses why data centers can benefit from industrial PLC/...Continue Reading
Recovery time and recovery point objectives in disaster recovery
The next time you're reviewing your disaster recovery RTOs and RPOs, think about what you want to accomplish and what metrics, tracking and approaches could help you to achieve or exceed those objectives successfully.Continue Reading
Debugging Samba: Deciphering Access Denied
When a user presents an Access Denied error message and says Samba is the culprit, is the blame warranted? Here's how to determine whether the error is the fault of Samba.Continue Reading
Control CICS and CPSM with IBM Rexx interface
The Rexx Library interface to CPSM is strange but powerful. It gives CICSPlex the functionality that allows enterprises to control CICS and CPSM both from TSO and batch.Continue Reading
Integrating Nagios with Netcool
SELinux on other distros (not just Red Hat)
How to manage software on Ubuntu Server with 'aptitude' and 'apt-get'
Learn how to use the commands "apt-get" and "aptitude" to perform package management from the command line.Continue Reading
CICSPlex System Manager basics
In this brief overview of CPSM, CICS expert Robert Crawford describes the risks and rewards of using it for system management, automation and workload management.Continue Reading
Securing your Linux server with iptables
Harden your Linux server security with this tutorial on configuring the rules for iptables in your firewalls. See samples of code for rules and iptables, as well.Continue Reading
Setting up SSH2 on Red Hat Enterprise Linux
Find out how to set up SSH2 (Secure Shell) on Red Hat Enterprise Linux (RHEL), using encryption keys instead of passwords in this tutorial. You can use this with either RHEL 4 or RHEL 5.Continue Reading
SPARC/Solaris vs. Intel/Linux
A Unix-Linux migration expert describes the differences between Solaris on SPARC as compared to. Linux on Intel.Continue Reading
Dual booting vs. virtualization: Using Windows and Linux on the same server
Interoperability between Linux and Windows can be achieved in two ways: one, by installing each operating system separately via dual booting -- which allows both operating systems to run on the same hardware -- and two, by running one system inside ...Continue Reading
Alert vs. log in the Snort /var/log/snort directory
A Linux security expert explains that the difference between the Snort alert and log logs in the Snort /var/log/snort directory is based on how rules are written.Continue Reading
Intrusion detection with Snort on Red Hat Enterprise Linux 5
Snort is a popular open source intrusion detection system (IDS). Learn how to install this security tool and configure it with MySQL on Red Hat Enterprise Linux 5. This is also applicable to Red Hat Enterprise Linux 4, CentOS 4 and 5 and Fedora Core...Continue Reading
HP UNIX performance monitoring fundamentals
UNIX system performance monitoring involves more than just keeping an eye on the amount of free space or the number of users who are logged in. With the right system performance monitoring know-how, you can look into various files to find out ...Continue Reading
OpenOffice 2.0 tutorial: Using SQL View, Query Design and more with Report Writer
Learn how to use the Query Design and SQL View tools, handle report-specific fields, print fast reports and more in this tutorial on OpenOffice's Report Writer.Continue Reading
Disaster recovery on the mainframe: New options for site recovery
Disaster recovery on the mainframe now includes data recovery support such as redundancy and failover. But disaster recovery planning still requires some strategic effort to properly execute a site recovery.Continue Reading
Identity management and single sign-on (SSO)
Learn about the challenges of identity management and how deploying single sign-on (SSO) can solve some of those issues, using popular programs like Kerberos, JA-SIG CAS and LDAP.Continue Reading
Mainframe change management tools ease compliance burden
Mainframes host a bulk of the critical data important to compliance auditors, but data center managers have had to rely on brute force and aging tools.Continue Reading
Distributed computing, clusters and high-availability solutions
A Unix-to-Linux expert describes educational resources about distributed computing, clusters and high-availability solutions for a user who is considering a move to Linux from Unix.Continue Reading
Compiling OpenSSH on Ubuntu 7.04 Feisty Fawn Server
Find out how to compile OpenSSH on the latest version of Ubuntu, Ubuntu 7.04 Feisty Fawn Server, to get safely connected to your remote servers.Continue Reading
$ PATH vs. pwd
An expert describes the difference between two shell commands, $ PATH and pwd.Continue Reading
Improving Snort performance with Barnyard
Increasing the speed and efficiency of intrusion-detection system application Snort means reduced false positives and more focus on actual threats. You can do this with Barnyard, a third-party application that leaves Snort with more capacity to scan...Continue Reading
MySQL database features: ACID, buffer pools and blob fields
A MySQL core-certified expert outlines some of the basic functions and purposes of buffer pools, ACID-compliant transactions and more.Continue Reading
PostgreSQL or MySQL: Which is faster?
There isn't always a clear-cut answer in the race between dueling databases, PostgreSQL and MySQL, says an expert. Find out his thoughts and how the two compare.Continue Reading
Google Docs vs. OpenOffice
An office suite expert recommends breaking spreadsheets into smaller pieces for sharing between users.Continue Reading
Cable remediation in the data center
Cable remediation in the data center is a viable strategy for ameliorating inefficiencies caused by years of data center server add ons, moves and changes.Continue Reading
Unix-Linux printing
Interoperability is easier than separating systems your systems and isn't something you should be afraid of, says one expert. Find out how to set up printing between Unix and Linux using Linux's LPR utility and Unix's SMIT in this tip.Continue Reading
Mainframe capacity planning: More than MIPS
Capacity planning is a well understood, strategic exercise. But data center managers need to consider strategic versus tactical performance planning to keep high-priority workloads running without problems.Continue Reading
Bastille Linux: Introduction and installation
Bastille Linux is an automated security tool, ideal for cross-platform environments. Get started here with an introduction and instructions for installation.Continue Reading
Data center consolidation, virtualization: Ultra-dense server deployments
Combining blade server, virtualization and SAN technologies in the data center leads to ultra-dense server deployments, which can save on hardware costs and power.Continue Reading
Printer sharing between Windows and Linux
Figure out how to connect your Windows machines to a shared printer as a network device from your Linux box in this tip.Continue Reading
Is there a mainframe skills shortage?
As baby-boomer IT professionals retire over the next five to seven years, mainframe shops are going to have great difficulty managing their mainframe environments. But how serious is the mainframe skills shortage?Continue Reading
CICS program list tables: PLTPI and PLTSD programs
CICS expert Robert Crawford describes the two types of program list tables (PLT)Continue Reading
MySQL full outer join workaround
A MySQL expert offers a workaround for the lack of syntax support for full outer joins.Continue Reading
Managing high-volume CPU processes with Bash
Learn how to use and modify a simple Bash script to alert you when CPU processes reach abnormally high levels.Continue Reading
SUSE Linux administration: How to set up a cluster file system
Setting up OCFS2 as a shared file system in a cluster environment helps when multiple nodes have to write to the same file system concurrently. Learn how to do it with SLES10.Continue Reading
Mainframe Linux vs. Unix
Discover how Linux on the mainframe -- in this case, the IBM System z Server -- compares with Unix, in terms of its availability, features and performance.Continue Reading
Badge systems for entry and tracking in the data center
Expert JP Callahan explores the world of badge system entry to the data center and reminds users to always back their security technology with a good process,i.e. two-factor authentication.Continue Reading
Using AppArmor on Red Hat
A user wonders whether it is possible to use AppArmor in the place of SELinux on Red Hat Enterprise Linux 4 and learns about both security tools.Continue Reading
Linux/Unix commands: How to get copy, conversion power with dd
Learn how to use dd, a Linux command for handling convert-and-copy tasks. An expert shows how to clone your hard drive, create a backup of your Master Backup Record and increase your swap space.Continue Reading
MySQL Enterprise vs. MySQL Community
The differences between MySQL Enterprise and MySQL Community.Continue Reading
Migrating Microsoft Works databases to OpenOffice Base
A reader asks for advice on migrating from Microsoft Works databases to OpenOffice's Base.Continue Reading
Easing SUSE Server administration from the command line
Sander van Vugt, author of "The Definitive Guide to SUSE Linux Enterprise Server" expands upon the uses of SUID and SGID, how to make device sharing easier and ways to manage files that live in more than one place.Continue Reading
Enterprise redundancy using VRRP
Get started using Virtual Router Redundancy Protocol (VRRP), a standard used in enterprise environments where routing redundancy is necessary for host stations. VRRP can provide additional availability to help reduce router failure on your Linux ...Continue Reading
RHEL4 administration tools: ifconfig, arp, tcpdump and iptraf
Master network integration in your existing RHEL4 infrastructure with the use of command-line tools like ifconfig, arp, tcpdump and iptraf.Continue Reading
CICS trace: Getting started, formatting and externalizing
CICS expert Robert Crawford describes the handy CICS trace tool and gives code for externalizing its output.Continue Reading
Managing events with Nagios Event Broker
Use modules with Nagios Event Broker, a server event output and integration tool, for receiving events and executing code on them. In this tip, you'll learn how NEB functions, what modules are available and how to find other modules.Continue Reading
Data center cooling strategies: Overheating server prevention
Five strategies from Syska Hennessy data center cooling experts, Christopher Johnston and Vali Sorell, for preventing servers from overheating.Continue Reading
Running Windows as a VM on Linux with VMware Server
If you don't want to spend money on an expensive Citrix setup for running Windows and Linux, then try running Windows as a virtual machine (VM) on Linux with VMware Server.Continue Reading
Advanced Intrusion Detection Environment vs. Tripwire
What is the difference between Advanced Intrusion Detection Environment and Tripwire?Continue Reading
Migrating Microsoft Internet Information Server to Apache on Red Hat Linux
If you're moving to Apache server from Microsoft Internet Information Server, be aware that this migration involves more than just copying files. In this tip, users will learn how to move a site from IIS to Apache on Red Hat, although this is ...Continue Reading