48 Results for:L1I
- Sort by:
The 12-Factor App is cloud-native development for dummies
08 May 2017Yegor Bugayenko wrote an amusing blog the other day entitled "SOLID is OOP for Dummies." Well, if SOLID is OOP for dummies, I wonder if he'd agree with my assertion that the 12-factor app mantra is ... Read More
Storage Word Search: Summer IT fun
19 Jun 2006How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Read More
An overview of multi-tenancy in Remote Desktop modern infrastructure (RDmi)
23 Aug 2018RDS MVPs explain why multi-tenancy is so important, how it works in RDmi, and how to set it up. Read More
Mobile phones and health: is 5G being rolled out too fast?
24 Apr 2019European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile ... Read More
Router Expert: Implementing router interface redundancy
23 May 2004While redundancy is simple as a concept, it becomes quite problematic in practice. This tip offers the basic options for router interface redundancy. Read More
Troubleshooting common VMware ESX host server problems
03 Jun 2008Get a grip on potential VMware ESX host server problems including the purple screen of death, a frozen service console, and rebuilding your network configurations after they've been lost. Read More
Troubleshooting Logical Volume Manager boot problems
27 Aug 2009If Logical Volume Manager (LVM) boots incorrectly, logical volumes are inaccessible and you can't manage server disk space. In this LVM how-to, we offer some simple steps to troubleshoot boot issues with LVM. Read More
Installing vCMA and VMware iPad app for remote vSphere management
18 Mar 2011To manage vSphere with the VMware iPad app, the vCMA appliance must be installed. After the vCMA installation, you need to configure the VMware iPad app to manage vSphere. Read More
Working with the Layer 2 data link layer in an IP telephony deployment
02 May 2005This IP telephony deployment article provides solutions to performance issues in Layer 2, the data link layer. Read More
Nmap tutorial: Nmap scan examples for vulnerability discovery
20 Jul 2011Learn how to use Nmap, the free network scanner tool, to identify various network devices and interpret network data to uncover possible vulnerabilities. Read More