VCS Veritas Cluster commands

# hastatus -sum— SYSTEM STATE– System               State                FrozenA  tb_sdu01a            RUNNING              0A  tb_sdu01b      …

IDS Tipping Point

Proactive Network SecurityIntrusion Detection Systems, by definition, only detect and do not block unwanted traffic. The TippingPoint IPS operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. In fact, TippingPoint optimizes…

Mouse action recording

ReMouse is a tiny program that lets you record and play back a series of keyboard and mouse actions, and saves operation records as script files for later use. It is as simple as the music player, there is…

NAS Systems

Rapid file storage growth, driven by rich media, document and backup files and email, impacts businesses more now than ever before. Consolidating file data with a dedicated Network Attached Storage (NAS) solution can help you address your changing file serving…

Top 10 Linux Virtualization Software

Virtualization is the latest buzz word. You may wonder computers are getting cheaper every day, why should I care and why should I use virtualization? Virtualization is a broad term that refers to the abstraction of computer resources such as:…

Agile methodology – Scrum

What Is Agile? Agile methodology is an alternative to traditional project management, typically used in software development. It helps teams respond to unpredictability through incremental, iterative work cadences, known as sprints. Agile methodologies are an alternative to waterfall,…

Responsibility assignment matrix – RACI model

Key responsibility roles ResponsibleThose who do the work to achieve the task.[7] There is at least one role with a participation type of responsible, although others can be delegated to assist in the work required (see alsoRASCI below for separately identifying…

ETL Extract, transform, load

,_transform,_load Real-life ETL cycle The typical real-life ETL cycle consists of the following execution steps: Cycle initiation Build reference data Extract (from sources) Validate Transform (clean, apply business rules, check for data integrity, create aggregates or disaggregates) Stage (load into staging tables, if used) Audit…

The Capability Maturity Model (CMM)

Maturity model A maturity model can be viewed as a set of structured levels that describe how well the behaviors, practices and processes of an organization can reliably and sustainably produce required outcomes. A maturity model can be used…