Managing a server is not as complicated as you might think, but there are a few gotchas that often catch out neophyte server hosting clients. You shouldn’t feel bad about making mistakes: most of the old hands who frown at you from the pages of Serverfault made the same mistakes and learned from the experience.
- Privacy and security. Data is hosted on a platform that is not controlled by the business, which has no insight into the platform’s security or privacy.
- Consistency. SaaS businesses are often bought and sunsetted. They frequently pivot in a direction that is not beneficial to users.
- Portability. A business should be free to take its data where it pleases, but it is not in the interest of SaaS vendors to make that easy.
Shadow IT is very much the boogeyman of enterprise IT. It’s right up there with digital espionage, DDoS attacks, and ransomware. The good news is that unlike a hostile nation-state or a colossal botnet, it’s actually quite easy to deal with.
Server administrators manage a lot of passwords. Every database, content management system, user account, application, and third-party service should be protected by a long, random, and unique password.
Tmux is a terminal multiplexer. That might not sound particularly interesting, but it is one of the most useful programs in the server administrator’s toolbox. A terminal multiplexer can split a terminal window into multiple windows, each of which runs a shell.
Bash, the shell that CentOS users interact with on the command line, is almost 30 years old. As a text-only interface, it has, over the years, developed many small conveniences for making the process of entering, recalling, and editing commands as efficient as possible. Among the most useful is Bash’s command history.
Earlier this year, MySQL 8.0 was released. It’s a big release with a host of new features, performance improvements, and stability enhancements.
Before we dig into what is new in MySQL 8, MySQL users might be wondering what happened to MySQLs 6 and 7. The most recent stable version is MySQL 5.7.
As the traditional belief goes, cybersecurity isn’t really the bailiwick of a business’s executive board. It’s something that’s to be handled by your IT department. They’re the ones with the necessary expertise to keep your data, applications, and systems protected against all manner of cybercrime.
It’s a battle that’s played out inside our bodies ever since the first human being set foot on earth. Viruses and bacteria attempt to force their way into our bodies, where they can multiply and wreak havoc. Our bodies, meanwhile, have multiple defenses for dealing with these invaders – from the outer layer that is our skin to our internal immune systems.