Disaster Recovery

In today’s highly competitive business environment, downtime is not an option. To ensure business continuity, many IT departments implement a disaster recovery (DR) solution to keep their systems running during a service outage. One DR method that has been turning heads recently is the cloud-based disaster-recovery-as-a-service (DRaaS) model. Like other cloud-based services, DRaaS is growing…

+ read more

Mike Robinson
Jun 9, 2015
7:56 am
Reads:
1,229
Score:
Unrated

From time to time a hardware malfunction, network outage or simple a disaster can occur, so it is a very good idea to have a disaster recovery plan available and updated. This document describes the process of cloning an eDirectory box in a “Offline” fashion. It is very useful when you need to restore a previous eDirectory box that was lost for any reason.

dlugohernandez
Feb 3, 2015
3:23 pm
Reads:
1,286
Score:
Unrated

No one likes to think about disasters, or disaster recovery, but it seems every week some new disaster has made the news headlines.  I’m not sure whether there really is more going on in the world these days, or whether that’s a function of our ability to instantly get reports on newsworthy items from around…

+ read more

Mike Robinson
Jan 23, 2014
8:07 am
Reads:
33,437
Score:
Unrated

Novell offers disaster recovery and business continuity solutions for large enterprises to plan for the worst. Planning for disaster recovery now ensures your data center is protected and prevents the loss of productivity and money. Rajesh Battala explains how they use PlateSpin products to prepare for disasters in their data center.

By: battala
Apr 14, 2010
4:00 pm
Reads:
2,849
Score:
Unrated

I’ve been doing some looking around at Squid add-ons for the first time in a long time. It appears that they’ve thinned out dramatically!

I’m specifically looking for a quota management tool which is compatible with a Squid/Dansguardian configuration. If need be, integration to just plain squid will do.

By: preycor
Jul 8, 2009
3:53 pm
Reads:
2,883
Score:
Unrated

When users are being blocked out of sites that have legitimate benefits, it’s difficult to track down exactly which rule is triggering the block. In the past you could use NWAdmin, but that’s no longer an option. Stephen Spalluto shares his nifty solution.

Categories: Uncategorized
By: sspallut
May 14, 2008
11:06 am
Reads:
1,696
Score:
Unrated

How do you centralize your iptables commands in Access Manager for easier handling? Neil Cashell has the answer …

Categories: Uncategorized
By: ncashell
Feb 27, 2008
11:36 am
Reads:
2,008
Score:
Unrated

David Pickett shares a few tips and a list for blocking those sneaky proxy sites that are bypassing your filters.

Categories: Uncategorized
By: coolguys
Jun 20, 2007
4:26 am
Reads:
2,033
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow