Operations | Monitoring | ITSM | DevOps | Cloud

Power Admin

Toughening Security for Linux Servers

As with any other operating system, security is a prime concern with Linux network hardware. In this article, we’ll be giving some recommendations on how to toughen the security posture of your Linux servers. Screenshots and example syntax relate to systems running Kali Linux, CentOS, RHEL, Ubuntu, and Debian-based Linux distributions.

New Horizons for Mobile Edge Computing (MEC) and IoT

As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.

How to Strengthen Security on Windows 10 Networks

The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the security status of your Windows 10 workstations and network configuration.

Best Practices for Configuring Linux Containers

Within a Linux network or development system, launching a limited set of applications or services (often known as microservices) in a self-sustaining container or sandboxed environment is sometimes necessary. A container enables administrators to decouple a specific set of software applications from the operating system and have them run within a clean, minimal, and isolated Linux environment of their own.

How to Configure Windows Network Printers and Email in Office 365

Enterprise users of Office 365 often need to configure a multi-function printer to use the platform’s SMTP email capabilities on their network. There are several ways of doing this, each with their own benefits and disadvantages. In this guide we’ll be looking at the steps required in setting up Office 365 network printing and email under various conditions.

How to Configure a Multicast Linux Network

In a world where consumer-level computing technology has been largely dominated by Windows, many users remain unaware of the need for administrators to configure and maintain network hardware and environments based on the Linux operating system. But Linux in its various distributions and the Unix operating system from which they derive have for decades provided the backbone for the core systems that make consumer-level computing and indeed many aspects of daily life possible.

10 Tech Blogs to Bookmark in 2019

The fact that you’re reading this suggests that you like to keep on top of what’s new in tech. With anything and everything now being considered “newsworthy”, it can be hard to filter out the articles that are actually relevant to your interests. That’s why if you’re keen to keep yourself up-to-date on the upcoming digital trends and gadgets of 2019, we suggest bookmarking some of these blogs so that all of your desired reading is just a click away.