White Paper and Resource Library

Geek Guides

Build a Private Cloud for Less Than $10,000!

Sponsor: Servers Direct and Seagate | Topic: Cloud

This eBook presents a compelling argument as to why you should consider re-architecting your enterprise toward a private cloud. It outlines some of the design considerations that you need to be aware of before implementing your own private cloud, and it describes using the DevCloud installer in order to install OpenStack on an Ubuntu 14 server. Finally, this eBook will familiarize you with the features and day-to-day operations of an OpenStack-based private cloud architecture.

Geek Guide cover

Slow Down to Speed Up: Continuous Quality Assurance in a DevOps Environment

Sponsor: New Relic | Topic: DevOps

DevOps is one of the newest and largest movements in Information Technology in the past few years. The name DevOps is a portmanteau of “Development” and “Operations” and is meant to denote a fusion of these two functions in a company. Whether or not your business actually does combine the two functions, the lessons and tools learned from the DevOps movement and attitude can be applied throughout the entire Information Technology space. This eBook focuses on one of the key attributes of the DevOps movement: Quality Assurance. At any point, you should be able to release your product, code or configuration—so long as you continue keeping your deliverables in a deployable state. This is done by “slowing down” to include a Quality Assurance step at each point in your workflow. The sooner you catch an error or trouble condition and fix it, the faster you can get back on track. This will lower the amount of rework required and keep your team’s momentum going in a forward direction, enabling your group to move on to new projects and challenges.

Webcasts

One Click, Universal Protection Implementing Centralized Security Policies on Linux Systems

Sponsor: Bit9 + Carbon Black | Topic: Security

ON DEMAND

with Linux Journal's Bill Childers.

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

A Call to Arms for Private Cloud Builders

Sponsor: ActiveState | Topic: Cloud Computing

ON DEMAND

The era of elastic IT is here. Businesses are realizing that the cloud not only allows cost reduction, but provides opportunities for innovation and growth. Elastic clouds enable next-generation applications that drive revenue opportunities, increase agility, and make IT teams competitive with public cloud systems.

In this presentation, Randy and John talk about the forces driving this change, and outline an action plan for building an elastic cloud infrastructure and dynamic applications using DevOps and Platform-as-a-Service.

 

Learn the 5 Critical Success Factors to Accelerate IT Service Delivery in a Cloud Enabled Datacenter

Sponsor: IBM | Topic: Cloud

Today's organizations face an unparalleled rate of change. Cloud enabled data centers are increasingly seen as a way to accelerate IT service delivery and increase utilization of resources while reducing operating expenses. Building a cloud starts with virtualizing your IT environment, but end to end cloud orchestration solution is key to optimizing the cloud to drive real productivity gains.

Linux Backup and Recovery Webinar

Sponsor: Storix | Topic: Backup and Recovery

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Downloads

Storix Free 30-day Trial

Sponsor: Storix | Topic: Data Security

Linux data backup and disaster recovery is at the core of what Storix does best. Storix System Backup Administrator (SBAdmin) provides Systems Administrators the peace of mind that mission critical Linux systems can be recovered in their entirety without having to reinstall the operating system. Sign up for a FREE 30-day trial today.

White Papers

Private PaaS 101: What It Is and Why You Need It

Sponsor: ActiveState | Topic: Cloud Computing

For the real-world enterprise, the cloud promises flexibility, efficiency, and convenience. The CIO wants ROI. The DevOps lead wants to scale. And the developer wants to launch apps fast. But those attractions mask realistic potential risks to data integrity, privacy, and even peace of mind. Cloud computing -- particularly the public-cloud model -- delivers flexibility, efficiency, and convenience, but at the potential cost of a loss of data governance, application oversight, and risk management. And that’s enough to make even the earliest of early adopters hesitate to move to the cloud.

Stackato is the application platform for creating a private PaaS using any language on any stack on any cloud. Private Platform-as-a-Service enables the real-world enterprise to reap the benefits of cloud computing while preserving the order of on-premise managed IT.

Private PaaS for the Agile Enterprise

Sponsor: ActiveState | Topic: Virtualization

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Stackato PaaS Architecture: How it works and why

Sponsor: ActiveState | Topic: PaaS

Stackato is software for creating a private Platform-as-a-Service (PaaS), letting you use a more advanced application hosting model than Infrastructure-as-a-Service (IaaS) or cloud orchestration software.

This high level overview shows how the parts of a Stackato PaaS work together to provide quick, automatic configuration of application environments and efficient use of computing resources.

Using an Open Source Framework to Catch the Bad Guy

Sponsor: DLT Solutions | Topic: Security

Built-in forensics, incident response, and security with Red Hat Enterprise Linux 6

Every security policy provides guidance and requirements for ensuring adequate protection of information and data, as well as high-level technical and administrative security requirements for a system in a given environment. Traditionally, providing security for a system focuses on the confidentiality of the information on it. However, protecting the data integrity and system and data availability is just as important. For example, when processing United States intelligence information, there are three attributes that require protection: confidentiality, integrity, and availability.

Learn more about catching the bad guy in this free white paper.

Bullet-Proof Your Enterprise Linux Environment

Sponsor: Beyond Trust | Topic: Security

Providing accountability for privileged user activity across your server infrastructure is critical, and can be easily addressed through simple best practices. In this white paper, Bullet-Proof Your Enterprise Linux Environment we outline these best practices and offer a solution to this pervasive dilemma.

Multimedia on Linux - cover

Corporate Multimedia on Linux

Sponsor: Fluendo | Topic: Multimedia

Businesses using Linux on employeesʼ PCs and Thin Clients terminals need to fit out their devices to enable users to playback all sort contents for a number of different purposes. Choosing the right software can make the distinction not only in terms of quality playback, but also by offering ongoing support that certifies business continuity.

Fabric-Based Computing Enables Optimized Hyperscale Data Centers

Sponsor: AMD | Topic: Scalability

Today’s modular x86 servers are compute-centric, designed as a least common denominator to support a wide range of IT workloads. Those generic, virtualized IT workloads have much different resource optimization requirements than hyperscale and cloud applications. They have resulted in a “one size fits all” enterprise IT architecture that is not optimized for a specific set of IT workloads, and especially not emerging hyperscale workloads, such as web applications, big data, and object storage. In this report, you will learn how shifting the focus from traditional compute-centric IT architectures to an innovative disaggregated fabric-based architecture can optimize and scale your data center.

Git Adoption in the Enterprise: Factors to Consider - cover

Git Adoption in the Enterprise: Factors to Consider

Sponsor: AccuRev | Topic: Git

With the rise in popularity of Distributed Version Control Systems (DVCS), Git has gained momentum. But is the enterprise ready to adopt a new model of working, possibly sacrificing the process management and security of traditional software configuration and change management (SCCM)? Learn the reasons developers choose to use Git, the risks of using Git across an enterprise that often lead to costly manual workarounds, and alternative solutions that integrate with Git to make it enterprise-ready.

How to Automate Enterprise Scheduling

Sponsor: SkyBot Software | Topic: Automation

Your IT department needs workload automation software in order to remain afloat, but where do you begin?

By breaking down your automation project into manageable steps—from vendor shopping to implementation and beyond—this white paper keeps your automation project on a fast-track plan that delivers measureable results quickly and sustainably.

JBoss Enterprise Application Platform for OpenShift Enterprise

Sponsor: DLT Solutions | Topic: Cloud

Red Hat’s® JBoss Enterprise Application Platform for OpenShift Enterprise offering provides IT organizations with a simple and straightforward way to deploy and manage Java applications. This optional OpenShift Enterprise component further extends the developer and manageability benefits inherent in JBoss Enterprise Application Platform for on-premise cloud environments.

Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Sponsor: Red Hat | Topic: Linux Management

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Migrating Middleware Applications Using Red Hat Enterprise Virtualization

Sponsor: Red Hat | Topic: Virtualization

Consolidating older servers to newer Intel® Xeon® processor-based Dell platforms that employ power-saving capabilities and faster processors with more cores can be an excellent strategy for reducing data center costs. However, to realize these cost savings, application owners must limit the retuning and testing costs of porting applications. Consolidating to a virtualized environment that supports virtual machines (VMs) running the original operating system can be an ideal and easy-to-implement solution.

Standardized Operating Environments for I.T. Efficiency

Sponsor: Red Hat | Topic: Dev Ops

The Red Hat® Standard Operating Environment SOE helps you define, deploy, and maintain Red Hat Enterprise Linux® and third-party applications as an SOE. The SOE is fully aligned with your requirements as an effective and managed process, and fully integrated with your IT environment and processes.

Sudo or Sudoesn't

Sponsor: Beyond Trust | Topic: Security

This white paper highlights certain situations where sudo has its place in IT and also shows where it sudoesn’t. In the 30 years since its inception, much has changed in security, compliance and audit requirements and the need for more robust and manageable solutions has emerged.

Ubuntu Virtualization Made Easy

Sponsor: CariNet | Topic: Virtualization

Ubuntu Server is the leading platform for consolidating datacenters. Ubuntu Server provides KVM as the core option for both host and guest virtualization thus creating a seamless environment. Using Ubuntu and KVM is perfect for the dynamic growth and reduction of physical and virtual machines that are found in datacenters. Download the white paper and receive a discount code when you sign up for any CariNet Linux server.

V2V Migration to Red Hat Enterprise Virtualization on the Dell PowerEdge R820

Sponsor: Red Hat | Topic: Virtualization

Migration from one virtualized environment to another, called virtual-to-virtual migration (V2V), is a powerful method of reallocating or moving your virtualized workloads to meet business demands. Red Hat Enterprise Virtualization and the Red Hat virt-v2v migration tool make it easy for your existing virtual machines to migrate to the Red Hat Enterprise Virtualization platform. In our labs, we performed a migration of VMs on a legacy server to a Red Hat Enterprise Virtualization environment on a current-generation DellTM PowerEdgeTM R820 to show how straightforward the V2V migration process can be.

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix