Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
A deeper look at memory ranks, channels and types
Looking for new server memory? Learning about memory ranks, channels and types is a good step to making the right choice. Continue Reading
Cut-through versus store-and-forward in Ethernet switch architecture
Switches in the data center can push frames using either store-and-forward or cut-through. Is one Ethernet switch architecture better than the other? Continue Reading
Three questions on ASHRAE standards for data centers
Evolving ASHRAE standards for temperature and humidity allow data center owners to save money on power and cooling demands. Continue Reading
-
Setting traps with SLIP, king of the mainframe debugging tools
How to use SLIP, one of the best mainframe debugging tools, to set traps for annoying bugs. Continue Reading
Tweak Linux swap to improve server performance
Many administrators ignore or underutilize the Linux swap settings but making the proper adjustments will make for better system performance. Continue Reading
It’s an easy fix to clean up a GRUB error on your Linux server
A GRUB error will stop a Linux server cold, but following these steps should get you back on track.Continue Reading
Proper Linux DRBD setup helps sidestep common issues
Execute a proper DRBD setup in Linux to save money and avoid headaches.Continue Reading
Work from the ground up with a data center raised floor
A raised-floor design is costly, so proper planning and installation is the key to maximize your investment.Continue Reading
Setting up a mirrored Linux DRBD configuration over the network
Administrators can use the distributed replicated block device (DRBD) in Linux to set up basic data redundancy to connect the storage of multiple servers.Continue Reading
FM-200 systems: What data center managers need to know
Get the lowdown on using FM-200 systems for data center fire suppression, and whether or not they're a good choice for your company.Continue Reading
-
Five questions on data center environmental monitoring
Our expert explains how to maintain ideal conditions for your server room using data center environmental monitoring tools and techniques.Continue Reading
Avoiding single point of failure design flaws
Redundancy can help a data center avoid downtime, but sometimes hidden flaws in the electrical design can still create a single point of failure.Continue Reading
Changing vendors: Avoiding pitfalls, IT vendor contract negotiations
Negotiating IT vendor contract terms is crucial for protecting business continuity, physical property and intellectual assets when contracts end.Continue Reading
Using open source tools to monitor Apache Web Server performance
Much of today’s business relies on smooth operation of Web servers. Explore these three open source tools to monitor performance, security and traffic on Apache Web servers.Continue Reading
Implementing SBD STONITH in Linux HA clusters
An SBD STONITH approach is simple to set up and is a reliable way to ensure data integrity in a Linux HA cluster.Continue Reading
Basic disassembly: Decoding the opcode
Programmers can find benefit from disassembling object code–a lost art that begins with understanding the opcode.Continue Reading
Securing an Apache Web server with SELinux
Learn how to keep your Apache Web server secure by applying basic SELinux settings, including adjusting SELinux so Apache uses nondefault settings.Continue Reading
Considering a raised floor in the data center
Tile material, strength and durability are important factors to consider when selecting and installing a raised floor in a data center.Continue Reading
Selecting raised floors, panels for the data center
Choosing raised floor panels capable of supporting the weight of data center equipment cabinets requires taking a close look at strength ratings and manufacturers’ claims.Continue Reading
Server refresh options: When to rent a server vs. when to buy
Companies looking to replace old hardware must consider long-term goals and evaluate financing options when deciding whether to buy or rent a server.Continue Reading
When is server hardware too old?
Modern server hardware is allowing systems to handle more jobs and last longer, easing capital expenses for many data centers.Continue Reading
Transaction and database management on z/OS mainframe systems
Transaction and database management tools for mainframe systems, such as CICS, IMS and DB2, have been around for decades, but have evolved over the years to fit the needs of enterprise customers.Continue Reading
Data center design standards for cabinet and floor loading
The weight of today’s racks and equipment cabinets can stress floor structures, making it crucial to consider floor loading requirements in your data center design.Continue Reading
What to look for when conducting benchmark tests with PerfMon
Microsoft's PerfMon benchmark tests measure a wide range of processes and server aspects, but it can be difficult for IT professionals to understand the numbers and interpret the results.Continue Reading
Creating RPM packages in Linux
RPM software management on Linux systems truly has an advantage when you create your own RPM packages. Learn how to use the enhanced vim option to automatically generate a template file after creating a new RPM file with the .spec extension.Continue Reading
Safer failover testing procedures for the data center
Haphazard failover testing can be dangerous, but you can minimize the potential risk of data loss or corruption by following a few straightforward procedures.Continue Reading
Data center management for geographically split data centers
Geographically split data centers can reduce disaster recovery time to zero, but splitting data centers requires an intelligent network and savvy data center management.Continue Reading
Using DCIM tools to monitor data center power
Although DCIM tools include many capabilities for monitoring data center power and facilitating data center management, you should know their associated costs before implementing projects.Continue Reading
Increasing network bandwidth available to virtual machines
These three tips on increasing the amount of network bandwidth available to your VMs, including virtual network creation, can also potentially increase a host server's VM density.Continue Reading
Working with Linux file system attributes
File system attributes can provide a valuable addition to the way you ensure security on your Linux server. Learn how to mount, list and change file system attributes in ext4.Continue Reading
Two forgotten but useful CICS transactions
While CICS has evolved its system interface, the lesser-known CICS transactions ADYN and CSFE can still be useful for debugging and other tasks.Continue Reading
RHEL 6 ditches System V init for Upstart: What Linux admins need to know
System V init is fading to a memory in Linux boot systems as the new Linux disdribution releases, such as Red Hat Enterprise Linux 6, switch to using Upstart. Learn what is different with this boot service and how to work with it to get your Linux ...Continue Reading
Data center EPO vulnerability fixed in 2011 National Electrical Code
Data centers are no longer required to put the big red kill-switch on exit doors, thanks to a committee that convinced the NFPA to revisit its data center EPO regulation.Continue Reading
Creating an inventory with nmap network scanning
Nmap network scanning generates a full system inventory, but it's only usable with the right parameters and output format. Learn how to create an nmap inventory in this tip.Continue Reading
Setting up a syslog server in Linux
A central logging server can make it easier to manage logs. In this tip, learn how to collect and centralize syslog messages from your hosts onto one syslog server in Linux.Continue Reading
Uptime, TIA and BICSI: Who runs the data center design standards show?
With three major players in the game, where should you look for data center design standards? This tip discusses the similarities and differences between the Uptime Institute tier system, TIA-942 and BICSI 002-2010.Continue Reading
Kerberos authentication in RHEL: Easing Windows-Linux integration
Kerberos authentication for CIFS offers easier Windows-Linux integration. In this tip, learn how Kerberos authentication works and how to set it up in Red Hat Enterprise Linux.Continue Reading
Unix overview: The latest features in AIX, HP-UX and Solaris
Each of the major Unix versions have been updated with useful new features recently. In this overview, get up to date on the features you should know about in the latest releases of IBM AIX, Hewlett-Packard's HP-UX and Oracle's Solaris.Continue Reading
The IT chargeback system in a virtual data center
Managing chargeback can be a difficult task. Multiple company departments may share server hardware in a virtual data center. Learn how to implement an IT chargeback system that charges departments for resources fairly.Continue Reading
Three signs that it's time to change server vendors
Picking a server vendor is no easy task, and a lot more goes into the decision than just choosing the low-cost option. Also, unless a server vendor can adapt to a company's needs over time, it may be time to make a switch. Learn the red flags that...Continue Reading
Server virtualization training and education needed for successful virtualization rollouts
Virtualization technology is still a long way from Plug-and-Play. Successful virtualization rollouts need staff with the proper education and skills, and IT admins need to understand when it's time to add staff or tinker with the training.Continue Reading
Optimizing Linux swap space usage
Today's powerful servers with plenty of RAM can make swap space seem like a thing of the past, but knowing how much you need can help keep your system running smoothly.Continue Reading
Microsoft Windows Server 2008 licensing for virtualization
Choosing the right Windows Server 2008 edition can save big money in a virtual data center.Continue Reading
Installing the ModSecurity Web application firewall on Red Hat Enterprise Linux
Learn how to set up the ModSecurity Web application firewall on Red Hat Enterprise Linux 5.4 and Apache Web server 2.2.x. This firewall monitors access to Web servers to ensure that requests are valid and not malicious.Continue Reading
Calculating carbon emissions in the data center
While data center carbon measurement is in its infancy and lacks hard standards, it still may benefit IT admins to know basic methods for calculating carbon emissions as carbon legislation begins impacting data centers.Continue Reading
How to install Webmin and ease data center server management
In this introduction to Webmin, learn how the tool can make it easier to manage Unix and Linux servers in your data center. An expert describes how to install Webmin and get started with this free systems management tool.Continue Reading
Bus track and busway power distribution: Power anywhere?
Bus track and busway power distribution in the data center is a growing trend that allows for greater flexibility and accommodation of rising power densities. This in-depth exploration of bus-type power systems will help you decide whether this is a...Continue Reading
Booting a Xen virtual machine from CD-ROM or DVD
If your Xen virtual machine fails, you may want to boot it from an installation disk and run the rescue program. Learn the required steps to succesfully boot a Xen virtual machine from a disk on a Linux machine.Continue Reading
How to approach IT staffing in today's data center
Virtualization and tight budgets have changed IT staffing in modern data centers. Find out how to blend skills and technology for the best mix.Continue Reading
Troubleshooting PGMIDERR/AEI0 ABEND in CICS Transaction Gateway
This tip delves into resolving PGMIDERR/AEI0 ABEND errors within the CICS Transaction Gateway. The solution to these errors isn't always an intuitive one, and may require several additional and lengthy steps along the way.Continue Reading
Common security flaws to check for on your Linux-based Web systems
Your Linux server may have Web application-related security vulnerabilities that should be checked out and repaired. These can include passwords, PHP code injection, weak file and directory permissions and outdated Apache and PHP versions. Learn ...Continue Reading
Fixing Linux I/O write performance problems
Learn how to optimize your Linux server for I/O writes by adjusting I/O scheduler settings and journaling settings along with some advice about partition set-up.Continue Reading
Using common Linux mail clients with an Exchange Server
Begin your migration away from Microsoft Exchange by learning how to set up Linux mail clients, Evolution and Thunderbird, to talk to Exchange.Continue Reading
Linux cloning over the network using netcat
Use netcat to clone Linux images over the network onto multiple servers with a series of simple Linux commands including tar, tee, and dd. This alternative to tools like Clonezilla does not require setting up a separate server.Continue Reading
Dealing with CICS/MQ trigger interface quirks
Despite its simplicity, the CICS/MQ trigger interface has its share of quirks, such as messages left in queues and uneven workload distribution. An expert shares fixes for common CICS/MQ message triggering problems in this tip.Continue Reading
Linux networking: Using ip tool instead of ifconfig
If your server was configured manually, make sure the Linux network is set up with the correct IP configurations and the ip tool is being used to monitor your systems.Continue Reading
Developing a successful mainframe migration strategy
A successful mainframe migration strategy requires careful planning to avoid disruption to end users. This tip discusses best practices for migrating, regenerating or replacing mainframe applications.Continue Reading
Sizing computer room air conditioners for data center energy efficiency
Choosing a right-sized computer room air conditioner (CRAC) is crucial to data center energy efficiency, but there are many variables to consider. Learn more about data center air conditioning design, maintaining humidity levels and temperature, and...Continue Reading
Access and repair an ext3 file system with the superblock
A damaged ext3 file system is accessible and repairable, thanks to the data within either the superblock or the superblock's backup.Continue Reading
Should you pay for support on all Linux servers in your data center?
Free Linux distributions are gaining popularity, but choosing whether to adopt paid or free Linux depends on your support staff's level of expertise and the workloads you expect the Linux distro will handle.Continue Reading
Troubleshooting Logical Volume Manager boot problems
If Logical Volume Manager (LVM) boots incorrectly, logical volumes are inaccessible and you can't manage server disk space. In this LVM how-to, we offer some simple steps to troubleshoot boot issues with LVM.Continue Reading
How to choose the right uninterruptible power supply for your data center
This tip discusses how to choose the right-sized uninterruptible power supply (UPS) for your data center. It also explains common mistakes in UPS sizing and why UPS power ratings can be so confusing.Continue Reading
Avoid common pitfalls when calculating data center power load
For data center pros trying to size an air conditioning system or UPS, accurately estimating data center power load is critical. But there are many common pitfalls to avoid.Continue Reading
Open source mainframe software: Two perspectives
Would open source mainframe software allow systems programmers to make their systems work better and fix the mainframe pricing problem? Or would it open up shops to self-inflicted problems for IBM to fix?Continue Reading
Comparing Unix versions: AIX, HP-UX and Solaris
In this comparison of the top Unix versions, learn what distinguishes the file systems, management tools and virtualization products in Sun Solaris, Hewlett-Packard HP-UX and IBM AIX file systems.Continue Reading
How to install and use RRDTool to speed up MRTG monitoring
When monitoring a large number of hosts or devices with the MRTG graphing tool, the system experience frequent CPU spikes. In this RRDTool tutorial, learn how to install RRDTool and convert MRTG to use RRD storage to avoid system overload.Continue Reading
Troubleshooting Linux boot problems
If your Linux server fails to show the login screen at startup, you have a boot problem. Learn some tricks on how to diagnose and fix a Linux server boot problem from Grub failure to init and runlevels.Continue Reading
How to install and configure MRTG, an essential sys admin tool
Multi Router Traffic Grapher (MRTG) is an essential tool that allows systems administrators to monitor and graph network traffic and more. In this tutorial, an expert explains how to install and configure MRTG on Solaris 10.Continue Reading
Capacity planning tools tutorial for Linux and Unix
Effective capacity planning is a proactive way of ensuring that your data center servers will not prematurely run out of space or horsepower. Learn the tools available to help you, both native to Linux and Unix platforms including Solaris, Red Hat, ...Continue Reading
Air flow management strategies for efficient data center cooling
To achieve efficient data center cooling, you must reduce your facility's air flow waste. In this tip, an expert outlines air flow management strategies and best practices that can improve data center air flow, including the installation of blanking...Continue Reading
Optimizing server energy efficiency
Reducing data center energy consumption is a hot topic in the IT industry, but server energy efficiency has only recently become a focus of discussion. Improving server efficiency means optimizing the main components that impact a server's overall ...Continue Reading
Using CICS dump tables to manage problems in online systems
The CICS dump table feature, which maintains tables for transaction and system dumps, can be useful for diagnosing and managing problems in online systems when the information you need isn't available through default channels.Continue Reading
Server cluster failure considerations to maintain a fault-tolerant data center
Server clustering can help you achieve a fault-tolerant data center, but cluster failures can cause problems if your heartbeat monitoring system is on the same network as your production workload. An expert discusses the problems he encountered with...Continue Reading
Manage CICS workloads with transaction classes
Using transaction classes is a great way to manage CICS workloads that come in varying or unpredictable increments. Learn how to define transaction classes, calculate a maximum active number and get examples on how to use transaction classes in this...Continue Reading
Using z10 HiperDispatch for vertical CPU management
The new HiperDispatch feature for the IBM z10 mainframe manages CPU vertically instead of horizontally. This new feature could boost performance on large transactional workloads.Continue Reading
Solve the startup error 00161 and 00163 with IBM TP600?
Error 00161 on an IBM TP600 may be due to a faulty CMOS battery, and 00163 may relate to your version of utility PS2 EXE.Continue Reading
Improving data center cooling capacity with chilled water plants
With a chilled-water plant, you can improve your data center cooling capacity and possibly prevent more drastic measures, such as having to build a new facility.Continue Reading
Repairing SUSE Linux Enterprise Server using a Rescue CD
SUSE Linux Enterprise Server offers a Rescue CD for repairing the system if your hardware causes a crash at reboot. This tip shows you how to use it.Continue Reading
Ensuring server time synchronization with NTP on SLES
Synchronize your SUSE Linux Enterprise Server times using NTP time server. Two servers are recommended for enterprise situations, as redundancy will save the day in case of a disaster.Continue Reading
Use DFHLS2WS to expose CICS applications as a Web service
DFHLS2WS is one of the Web services assistants that allows traditional CICS applications to provide or consume Web services without significant changes and without getting into the details of SOAP or XML coding.Continue Reading
How to troubleshoot RHEL performance bottlenecks
This tip provides a step-by-step approach to application-tuning, troubleshooting bottlenecks and enhancing performance on RHEL 5 systems.Continue Reading
Using OpenSSL to create and manage certificates
Establishing an independent certificate authority with OpenSSL enables you to create public key certificates and to verify that these public keys are authentic and that email messages are secure.Continue Reading
Uninterruptible power supply load bus synchronization: Yes or no?
Should you consider paying the additional cost of a Load Bus Synchronization system for your uninterruptible power supply? Data center experts Syska Hennessy weigh in.Continue Reading
Selecting a general contractor: Data center construction runbook, Chapter 3
When you're building a new data center, it pays to bring the general contractor onboard early, rather than bidding out the process and ending up with unqualified subcontractors on your project.Continue Reading
Are you prepared for the Unix 2038 problem?
All 32-bit Unix/Linux-based systems store the system clock time internally as the number of seconds since the "Epoch." The latest time and date that can be represented as seconds-since-the-Epoch in that 32-bit signed integer is 3:14:07 UTC on ...Continue Reading
Data center cooling optimization in the virtualized-server world
How many hamburgers can you cook on a blade server? If your servers are literally cooking there are a variety of systems to consider to keep your equipment cool.Continue Reading
Clarifying the GPL: Why Linux distros cannot be copyrighted
Confused about copyrights? Our expert explains how Linux can be copyrighted, but proprietary plans for Linux distributions are a pipe dream.Continue Reading
Do dual-power supply servers increase redundancy?
Implementing servers with dual power supplies is a common practice in mission-critical environments. But improper implementation can result in a false sense of power redundancy. This tip explains what can go wrong in your data center.Continue Reading
Oracle on RHEL 5: Installation and configuration
Install and configure Oracle 10 on RHEL 5. This tip shows how to set up a database with Oracle's Database Configuration Assistant (DBCA) and Oracle Enterprise Manager.Continue Reading
SUSE Linux Enterprise troubleshooting: Fixing boot problems by repairing a broken initrd
Having a problem booting SUSE Linux Enterprise on your server? It may be that you have a problem with your initial RAM disk. Expert Sander van Vugt troubleshoots the problem with this step-by-step guide to fixing a broken initrd.Continue Reading
Using SETools to manage SELinux policies
SETools can help SELinux administrators with the daunting task of writing, managing and reporting on policies with the help of tools such as apol, sediff, seaudit and sechecker. Our expert shows you how to setup SETools on your system and introduces...Continue Reading
Data center cooling and humidity control: CRAC or AHU?
Data center physical environment expert Robert McFarlane discusses the best temperature and humidity control choices for a reader's data center.Continue Reading
Data center facility control systems
Data centers are mission-critical environments with serious consequences for failure, but many employ the same commercial-style control systems as office buildings. Contributor Steve Blaine discusses why data centers can benefit from industrial PLC/...Continue Reading
CICSPlex System Manager basics
In this brief overview of CPSM, CICS expert Robert Crawford describes the risks and rewards of using it for system management, automation and workload management.Continue Reading
Setting up SSH2 on Red Hat Enterprise Linux
Find out how to set up SSH2 (Secure Shell) on Red Hat Enterprise Linux (RHEL), using encryption keys instead of passwords in this tutorial. You can use this with either RHEL 4 or RHEL 5.Continue Reading
SPARC/Solaris vs. Intel/Linux
A Unix-Linux migration expert describes the differences between Solaris on SPARC as compared to. Linux on Intel.Continue Reading
Dual booting vs. virtualization: Using Windows and Linux on the same server
Interoperability between Linux and Windows can be achieved in two ways: one, by installing each operating system separately via dual booting -- which allows both operating systems to run on the same hardware -- and two, by running one system inside ...Continue Reading
Alert vs. log in the Snort /var/log/snort directory
A Linux security expert explains that the difference between the Snort alert and log logs in the Snort /var/log/snort directory is based on how rules are written.Continue Reading
HP UNIX performance monitoring fundamentals
UNIX system performance monitoring involves more than just keeping an eye on the amount of free space or the number of users who are logged in. With the right system performance monitoring know-how, you can look into various files to find out ...Continue Reading
OpenOffice 2.0 tutorial: Using SQL View, Query Design and more with Report Writer
Learn how to use the Query Design and SQL View tools, handle report-specific fields, print fast reports and more in this tutorial on OpenOffice's Report Writer.Continue Reading