Guide
Download "New York's Cybersecurity Regulation: How It Affects IT Professionals Everywhere"
New York’s new cybersecurity law will affect organizations across the U.S. And its stringent requirements set a high standard for cybersecurity and data protection. In this guide, you’ll learn how this law reaches organizations beyond New York’s borders and why many other states are expected to follow suit. The guide features an easy-to-follow breakdown of the law’s most important requirements and...
Guide
Controlling SSH for Security and Compliance
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Guide
Protecting Your Data—How Much Security Is Enough?
As organizations become increasingly aware of the need to protect their data, the question that needs to be answered is how much security is enough? Unfortunately, that’s one of those “it depends” questions. Each organization must consider their own requirements before confidently answering that question. This document discusses those considerations.
Guide
Download “Automation without Alienation”
Automation has the potential to transform the way we work. It allows organizations drive efficiencies, increase reliability, and cut costs. But not everyone is on board with the change. Automation can be frightening to employees who worry about losing their jobs to robots and computers. This white paper from Computing tackles the problem of how to go forward implementing automation while...
Guide
UNIX Load Average Part 1: How It Works
In this online article Dr. Gunther digs down into the UNIX kernel to find out how load averages (the “LA Triplets”) are calculated and how appropriate they are as capacity planning metrics.
Guide
UNIX Load Average Part 2: Not Your Average Average
This is the second in a two part-series where we explore the use of UNIX load averages in performance analysis and capacity planning.
Guide
UNIX Load Average: Reweighed
This is an unexpected Part 3 to the discussion about the UNIX load average metric answering the question of where the weight factor comes from.
Guide
How to Get Unbelievable Load Test Results
This article is about delusions that arise from incorrect interpretation of load test measurements.
Guide
Capacity Calculations: Handle with Care
This paper discusses avoiding calculation results that are more precise than is justified by precision of corresponding measurement input data.
Guide
Evaluating Scalability Parameters: A Fitting End
This is the final online article concerning the concept of application scalability. Here, you will learn how to determine value of the parameters that control scalability.
Guide
The “LA Triplets” Quiz
This is a little quiz to test your understanding of the triplet of numbers that appear in the UNIX® load average (LA) performance metric.