Go Premium for a chance to win a PS4. Enter to Win

x

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

0
Veeam and MySQL: How to Perform Backup & Recovery
LVL 1
Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Tech spooks happen to every business owner. Check out my top solutions to these issues and share a story of your own! Simply submit your #TechorTreat article before October ends and be entered to win a  tech gadget.
8
1
1
Dear Experts,

I'm about to install Oracle Weblogic Server for the first time, I'm looking for your recommendation before strating the implementation even if on the OS level if you have any concerns please inform me so I can finish the job perfectly as my company will depend on me to finish it, I'll use subscribed RHEL v6.8 on HP proliant DL580 G7
1
 

Author Comment

by:m_Hosny
Thanks Brian B for your notice, I already did that earlier but actually this is the first time to use the app and I already got it.
0
 
LVL 25

Expert Comment

by:Brian B
Great.
FYI: For those who can help with the question, please go here: https://www.experts-exchange.com/questions/29058716/Oracle-Weblogic-on-RHEL.html
0
Only 10 days left to enroll in this month’s VMware virtualization course! Don’t miss out on this free course for Premium members, Team Accounts, and Qualified Experts.
1
4
 
LVL 7

Expert Comment

by:Nicholas
Accountability - what's that all about it.

Makes you wonder what they know that they get off with a nice retirement package...
0
 
LVL 17

Author Comment

by:Kyle Santos
Seriously.  They're like 'peace out y'all!'  *vacations in Maui*
0
ITKit-SocialMedia-Native.pngIT Day is around the corner! Take advantage of our free set of diagnostic and discovery tools to help you in and out of the office.
2
As Hurricane Harvey wreaked devastation across Texas and the Gulf, we took a look at how technology plays a role in storm tracking and how you can use it to help in the aftermath. MAR-3286-SupportTexas-Onsite--1-.jpg
7
Last chance! Today is the final day to enroll in August’s CompTIA IT Fundamentals course. Premium Members, Qualified Experts, and Team Accounts unlock 30 days of free access. Enroll today!



3
Visualize your virtual and backup environments
LVL 1
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Looking to get your CompTIA A+,  Network A+, or CompTIA Security+ certifications? The first step to these career milestones is to get your CompTIA IT Fundamentals certification. Enroll today in August’s free Course of the Month to begin preparing for the certification exam!
1
NativePostAugCOTM.pngConsidering a career in IT, or do you need a broad IT skill-set?  Take advantage of this month’s featured  CompTIA IT Fundamentals course! There are only 10 days for you to enroll to gain free access!
4
What technology do you think is a fad that won’t last?

Not sure it really qualifies as a "fad" because it's been around so long, but I'd say that a lot of existing password guidelines (special characters, changing them every 90 days, capitalization rules, etc.) are on their way out. Don't believe me? Even the creator of those rules now regrets them.

Although, I'm really looking forward to the day when passwords can just go away almost completely...
2
 
LVL 17

Expert Comment

by:Kyle Santos
Meanwhile, I just got this.  xD

Screenshot_2.png
Arrrggghhhhhh!
1
 
LVL 17

Expert Comment

by:Kyle Santos
Come to think of it.  After I graduated high school and started using computers more often I realized how difficult it was to remember passwords that had all those wacky requirements, so I started choosing last names of random people which is kind of similar to what xkcd had mentioned about four random words.  Admittedly, I was doing my best to try and work around difficult password requirements by making it easier for me to remember!  Take that, Bill Burr!
1
NativePostAugCOTM.pngHaving a basic knowledge of IT fundamentals demonstrates your readiness for the digital workplace. Enroll in August’s Course of the Month to gain skills in networking, cybersecurity, hardware, and software basics, and prepare for the CompTIA IT Fundamentals exam!
3
NativePostAugCOTM.pngAugust’s free Course of the Month is available today! Enroll in the CompTIA Fundamentals course to prepare for certification!
3
SysAdminDay2017-SocialMedia-Native.pngHappy SysAdmin Day! To celebrate we collected some your most humorous and downright ridiculous stories of tech tasks that are part of your day to day schedules but, we believe deserve more recognition and appreciation. Enjoy!
1
Dear Experts, Hard drive issue... Out of 180 C-drive only 36.1 gb is visible and there is no unallocated issue visible in disk management. It shows one drive very of 180 gb however when I check in my computer it shows 36.1 GB.
I TRIED using  third party disk management and almost all of them shows 180 or 36.1 drive as unformatted. Please note, I can't format the drive as some very important monitoring tools are running on this machine which cannot be migrated on another computer. This is happening on Intel nuc machine, windows 10 on a domain system.
0
 
LVL 63

Expert Comment

by:☠ MASQ ☠
Anil, looks like you meant to post this as a question.
Follow this link to do that and you should get a solution quickly
https://www.experts-exchange.com/askQuestion.jsp
0
3
 
LVL 54

Author Comment

by:Scott Fell, EE MVE
I don't think I shared it for how to catch a bullshitter, but more for the good points to think about in how we work.  A lot of this may be standard operating procedures in their daily lives and others may not.  

My big takeaway is understanding the problem objectively and asking the right questions before forging ahead,.  What problem is this going to solve, what are the costs (not just $$ but time/people),

Some good points for day to day work process.
3
 
LVL 11

Expert Comment

by:Jeffrey Dake
I totally agree, there are some good points in there about questions we should ask ourselves before we continue developing. I have seen plenty of "refactors" that made the code more reusable but there were no plans to reuse the code. By the time another developer got the chance to reuse it, the original assumptions were no longer valid and another refactor was needed.

As developers we should always be trying to balance how we solve problems with the benefits of how we solve them.
3
SysAdmin Day is this Friday! If you have a story of a time when your technical skill and expertise saved the day comment here. You can also message us!

Looking forward to reading more of your experiences!
3
Vote for the Most Valuable Expert
LVL 7
Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

I was just reading Andrew Leniart's entertaining tale of dealing with a client's network connection issue. (Go check it out... I'll wait...)
.
.
.
.
Ok, cool, now that you've read it, I'm sure it's something many of you have encountered—user says that they restarted something, but clearly they didn't. Made me think that in the current era where smartphones with cameras are so ubiquitous, a way to verify that the device in question actually had power would be to have the client take a photo of it and send that to you. Then you could know if A.) they were looking at the right device and B.) the power lights were really on.

Think it'd work? You ever try anything like that? Oh, and if you've got a similar SysAdmin tale, be sure to go comment on that same post!
3
Calling all System Administrators!!

We are excited for SysAdmin Day on July 28th! To celebrate, we are compiling the best SysAdmin stories from our community. We would love the opportunity to showcase your heroic tales of crazy problems you solved to keep the tech world going in our upcoming blog piece.  

Comment below or message us before Friday July 21st at 12pm PST to have your story included.
2
 
LVL 11

Author Comment

by:Experts Exchange
Thanks! We are looking for stories from within the EE community!
0
 
LVL 7

Expert Comment

by:Brian Matis
Not sure if this really counts, because I wasn't the SysAdmin in this scenario; instead, I was the problematic user! But here goes: back when I was a student at CalPoly, we had access to the school's UNIX system for things like our email. I had taken the C and UNIX class, so I knew my way around the command line enough to do more than just use PINE to check my email. I also really liked the SETI @ Home project, so I got the UNIX version of the client and installed it on my account on the school's system and would just let it run.

I think maybe I had it going for a month and I have no idea what sort of resources it was taking up. I imagine it wasn't really all that bad, but eventually, a SysAdmin did shut it down and told me not to do that again...

I imagine college SysAdmins have to deal with a lot of shenanigans like that! :-D
1
0
2
 
LVL 99

Expert Comment

by:John Hurst
Because:

1. People do not update their systems still.
2. People go to dodgy sites.
3. People open emails from complete strangers.

I am in no way surprised.
1
GettyImages-531851572.jpgIf you're heading to Vegas next week for Cisco Live, we'd love to hear all about your experience as an attendee. Interested in writing an article recapping your week at the conference? Contact us at ewooddell@experts-exchange.com.
2
Drew Frey writes articles on cyber security and ransomware protection.  Follow him if you're interested in seeing new articles in those topics.

https://www.experts-exchange.com/members/Drew-Frey.html
5
 

Expert Comment

by:Michael Bodine
SP INFOTECH was also part of a scam...they had people calling up with foreign voices and the company name would change..as they answered the phone.. certaintly unpredictable crap.
1
 
LVL 17

Author Comment

by:Kyle Santos
Source?
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.