Work

WD disk can’t be found

[root@localhost disk]# fdisk /dev/sdb Welcome to fdisk (util-linux 2.22.2). Changes will remain in memory only, until you decide to write them. Be careful before using the write command. Command (m for help): help h: unknown command Command action a toggle…

Fedora 18 installation experience

Few comments on what’s straight nd forward on Fedora 18 Chromium – impossible to install Firefox – yum install firefoxThuderbird – yum install thundebirdMySQL – yum install mysqldPHP – yum install phpApache – yum install apache Printer Samsung clp-315 with…

VCS commands

Veritas Cluster Cheat sheet LLT and GAB Commands | Port Membership | Daemons | Log Files | Dynamic Configuration | Users | Resources | Resource Agents | Service Groups | Clusters | Cluster Status | System Operations | Sevice Group Operations | Resource Operations | Agent Operations | Starting and Stopping LLT and GRAB…

VCS Veritas Cluster commands

# hastatus -sum— SYSTEM STATE– System               State                FrozenA  tb_sdu01a            RUNNING              0A  tb_sdu01b      …

IDS Tipping Point

Proactive Network SecurityIntrusion Detection Systems, by definition, only detect and do not block unwanted traffic. The TippingPoint IPS operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. In fact, TippingPoint optimizes…

NAS Systems

Rapid file storage growth, driven by rich media, document and backup files and email, impacts businesses more now than ever before. Consolidating file data with a dedicated Network Attached Storage (NAS) solution can help you address your changing file serving…

Top 10 Linux Virtualization Software

Virtualization is the latest buzz word. You may wonder computers are getting cheaper every day, why should I care and why should I use virtualization? Virtualization is a broad term that refers to the abstraction of computer resources such as:…

Agile methodology – Scrum

What Is Agile? Agile methodology is an alternative to traditional project management, typically used in software development. It helps teams respond to unpredictability through incremental, iterative work cadences, known as sprints. Agile methodologies are an alternative to waterfall,…

Responsibility assignment matrix – RACI model

Key responsibility roles ResponsibleThose who do the work to achieve the task.[7] There is at least one role with a participation type of responsible, although others can be delegated to assist in the work required (see alsoRASCI below for separately identifying…

ETL Extract, transform, load

,_transform,_load Real-life ETL cycle The typical real-life ETL cycle consists of the following execution steps: Cycle initiation Build reference data Extract (from sources) Validate Transform (clean, apply business rules, check for data integrity, create aggregates or disaggregates) Stage (load into staging tables, if used) Audit…