Server Software

7K

Solutions

17

Articles & Videos

11K

Contributors

A server is a computer program or a machine that waits for requests from other machines or software (clients) and responds to them. This architecture is called the client–server model. The clients may run on the same computer or may connect to the server over a network. The purpose of a server is to share data or hardware and software resources among clients. Typical computing servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.

Share tech news, updates, or what's on your mind.

Sign up to Post

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
1
Increase Agility with Enabled Toolchains
Increase Agility with Enabled Toolchains

Connect your existing build, deployment, management, monitoring, and collaboration platforms. From Puppet to Chef, HipChat to Slack, ServiceNow to JIRA, Splunk to New Relic and beyond, hand off data between systems to engage the right people.

Connect with xMatters.

Determining the an SCCM package name from the Package ID
2

This article was originally published on Monitis Blog, you can check it here.



Today it’s fairly well known that high-performing websites and applications bring in more visitors, higher SEO, and ultimately more sales. By the same token, downtime is disastrous for companies and can lead to major hits on a brand, reputation, and overall customer retention.

 

But there’s often a gap between knowledge and theory. In other words, people get the fact that high web performance is critical for revenue. But the reality is that somehow this gets lost in translation when it comes to implementation.

 

To be clear, web performance monitoring is defined as “the process of testing and verifying that end-users can interact with a website or web application as expected. Website monitoring is often used by businesses to ensure website uptime, performance, and functionality is as expected.”

 

If website performance is critically important to the success of your website, then what exactly are the key metrics you need to be tracking in order to measure that success? Let’s take a look at this question in more detail.


 

Page Load Time


This is one of the key metrics in web performance monitoring since everything today is about speed and seconds translate into dollars earned or lost. Page load time measures the time to load every content on a webpage. It’s calculated from the time the user clicks on a page link or types in a web address until the page is fully loaded in the browser.



Unique Visitor Traffic


This important measure tells you how many individual visitors are coming to your site in a predefined timeframe. An upward trend in this area will indicate that you’re providing content that is valuable to your target audience and shows that your marketing campaigns are successful.


  

Start Render Time 


Start Render Time is the first point in time that something is displayed on the screen. It doesn’t necessarily mean the user sees the page content. In fact, it could be something as simple as a background color. But it’s the first indication that something is happening on a website. Start Render Time has emerged as a key metric in web performance.

  


Bounce Rate 


This is a measure of the percentage of visitors to your website who navigate away from the site after viewing only one page. A high bounce rate indicates that visitors are making it to your site but finding nothing of value to keep them there. A good explanation could be that the landing page either has no clear calls to action or else a poor overall design.

 


Direct Traffic


This is a measure of the traffic that reaches your website directly by typing your URL into their browser, using a bookmark, or clicking on an untagged link in an email or document. This measure can indicate that you’re doing a good job of creating original content through email marketing, newsletters, and other channels.

  


Requests Per Second


Requests per second is a key metric which tells you how many actions are being sent to the target server every second. A request can be considered as any resource on the page such as HTML pages, images, multimedia files, databases queries, etc.

 


Throughput 


Generally speaking, throughput is a measure of how many units of information a system can process in a given amount of time. It’s an important metric in web performance because it tells you how much bandwidth is required to handle a load of both concurrent users and website requests. You always want to aim for a higher value of throughput.

  


Error Rate 


This is a measure of the percentage of problem requests in relation to all requests. If you see a spike in the error rate at a particular point in a load test, then it’s a good indication that something is preventing the application from operating correctly. This is valuable information that you need clear insights on.

  


Peak Response Time 


This is a metric that looks at anomalies within the average response time by showing elements that are taking longer than normal to load. This metric offers a very helpful way to pinpoint slower than normal applications that should be investigated further.

  


Landing Page Conversions


This measures the number of visitors who reach your landing page and fill out a form to become a lead. Along with this metric, it’s important to keep eyes on all types of conversions in your marketing funnel (visitor to lead, lead to customer, and visitor to the customer) to ensure that you’re avoiding any roadblocks or bottlenecks that can keep them from converting.



Sign up for Monitis FREE 15-day full-featured trial! Premium plan starting from $12/month only!

1
SCCM Add to GRP TS
Adding Computers to AD groups through an SCCM Task Sequence
1
Troubleshooting common task sequence error codes
1
BDR
Binary Differential Replication, What it is, how it works and how it differs from standard delta file replication
1
The following article is intended as a guide to using PowerShell as a more versatile and reliable form of application detection in SCCM.
1
 
LVL 8

Expert Comment

by:Senior IT System Engineer
Comment Utility
Hi SCCMCanuck,

Which of the Powershell line that I can edit safely to suit my environment ?
0
 
LVL 9

Author Comment

by:SCCMCanuck
Comment Utility
Thanks for your interest. At the moment the following lines are safe to change

[version]$InstallerVersion = '8.0.1210.13'
$AppName = 'Java*'

The value of $AppName variable is a wildcard string that corresponds with the DisplayName registry value, where as $InstalledVersion corresponds to DisplayVersion.

You can modify any part of the script to accommodate any type of detection method and use and/or statements to create a more restrictive set of criteria. The goal of my example is to make the SCCM client agent believe that Java is installed if its version is greater than or equal to the value of $InstallerVersion in the Variable Declaration section

Registry.PNG
1
The following article discusses and demonstrates the advantages of using Pull Distribution Points in SCCM 2012 SP1 or higher as opposed to traditional push based architecture
0
If, like me, you have a lot of Dell servers in the estate you manage this article should save you a little time. When attempting to login to iDrac on any server I would be presented with two errors. The first reads "Do you want to run this application" and pertains to the issues at the bottom of the prompt (see the image below). The second reads "Unable to launch the application". 

What this boiled down to was an issue with the iDrac virtual console and the latest version of Java. The Java client is looking for a security manifest on the application which it may not find, depending on the version of Drac you are running.

These are the errors I was encountering:-

1.jpg2.jpg
To fix it you need to add the address to Java’s trusted sites under the configure java options. To access this you open "Configure Java" from the start menu group Java. Then open the security tab, then click Edit site list. You then click Add and enter the fully qualified URL path. Unfortunately there isn’t a wildcard option so each server has to be explicitly added to the list.
3.jpgI do not recommend lowering the overall security setting as this could compromise the overall security of the machine in question.

I hope this saves you time, effort and pain.
2
Hello,

As I have seen there a lot of requests regarding monitoring and reporting for exchange 2007 / 2010 / 2013 I have decided to post some thoughts together and link to articles that have helped me.

Of course a lot of information you can get from the EMC but for me powershell is the way to go.

This said the first thing that I would encourage you to look at is the "Exchange Server 2010 Monitoring Management Pack" here -> http://www.microsoft.com/en-us/download/details.aspx?id=692

The link above has a reasonable detailed description as to what the pack is used for. From that description a few of the more interesting points are (and not restricted to) : detect, send alerts, and automatically correlate critical events, this management pack helps indicate, correct, and prevent possible service outages or configuration problems, allowing you to proactively manage Exchange servers and identify issues before they become critical.

Below there are some blogs that contain different scripts to accomplish the task you wish and of course you can add features and modify them.

How to Health Check an Exchange 2010 Mailbox Server -> http://exchangeserverpro.com/health-check-exchange-2010-mailbox-server/

Generate Exchange Environment Reports using Powershell -> http://www.stevieg.org/2011/06/exchange-environment-report/

Process Tracking Log (PTL) tool for use with Exchange 2007 and Exchange 2010 ->
4
Comparison of Amazon Drive, Google Drive, OneDrive
Comparison of Amazon Drive, Google Drive, OneDrive

What is Best for Backup: Amazon Drive, Google Drive or MS OneDrive? In this free whitepaper we look at their performance, pricing, and platform availability to help you decide which cloud drive is right for your situation. Download and read the results of our testing for free!

Preface

There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time.

There are different solutions for this, i.e. the W32time service on Windows machines some more OS specific solutions. One of the most widespread solutions for this is the Network Time Protocol, short NTP. It is around for a long time (published in September 1985), and implementations of the protocol exist for various operating systems, i.e.
 
DOS

FreeBSD

Linux

Macintosh

Novell

OS/2

UNIX

Windows
Besides of that there's the source code for the NTP client available in
C, Perl, Python, Ruby, and TCL for the harder kind of users. There's even an implementation in Java (SNTP only). This wide spread system base and the long history and development of NTP has led to a mature and very stable product.
 

Background - What does NTP, and what's SNTP ?

As lined out before, NTP is a background service that synchronizes the system clock with the clock of another, remote system. NTP does that by fine-tuning the system clock ticks to drive it smoothly into sync with the time master's clock. Afterwards it keeps it following the master's clock as close as possible by constantly monitoring the time diff and retune the …
5
 

Expert Comment

by:noooodlez
Comment Utility
Interesting article! Typical Microsoft, reinventing the wheel with something overly complicated, which doesn't quite work!

I am interested to find out more about what you mean by

In rare cases the windows installers fail to disable the W32time service. This results in two services manipulating the system clock, which leads to very interesting (and disgusting) results. If NTP on Windows gives weird results, first check if the W32time service is disabled.

Sounds very much like a problem I am experiencing but cannot nail down.
0
 
LVL 14

Author Comment

by:frankhelk
Comment Utility
@noooodlez:
Thank you for the positive feedback. You might also give me my first "Yes" in the feedback corner at the end of the article if you feel the urge :-)

To your question:

Since the problems arising from two services manipulating the system clock are obvious, the installer of the Windows port tries to do what's needed: Stop W32time and disable it (it's enabled for stating at system boot by default).

Sometimes the installer fails to do that, leaving W32time active and on "autostart at boot" - probably due to permissions problems on the specific system. To correct that, all you have to do is to run services.msc, find the Windows time keeper service, stop it, and set it to "Disabled" in its options dialog.
Hope that helps ...
0
Have you ever stumbled upon a software that is so great that you just love? It happened to me. Love at first sight. Filezilla Server.
 
Ok its not the most advanced ftp server I've came across. But its a fairly simple piece of software to get the job done on a windows machine.

My problem was that you cannot somehow "expire" inactive users. I found out that all the settings where saved on an xml named FileZilla Server.xml.  I played a lot with this and found out that its not an actual xml file , meaning the structure is not strict. So I've decided to find a way to expire inactive users that I've created after a grace period of 14 days.

prequisities:

1) windows xp sp3 (or any windows machine for that matter as long as you adapt the paths of the aforementioned files)

2) A working installation of Filezilla server  in version 0.9.34.0 (i am referring to this version because the produced xml might not work on another version)

3) Enabled logs. under settings,logging , enable logging to file and use differend log file every day. It can work by deleting logs after 14 days but i like history!

4) A installation of perl . Can be found in the xampp package http://www.apachefriends.org/en/xampp.html or www.perl.org .
perl modules used: XML::Simple, Data::Dumper , Time::Local, Date::Calc .  

5) Make sure you have the above modules installed. You can install by runnning Cpan and install XML::Simple , install Data::Dumper, Time::Local ,Date::Calc . and exit.


0

Introduction


People like FTP.  It's a solid, stable, robust protocol for quickly transferring files between two hosts using TCP/IP.  In most cases it's much faster than SMB or CIFS, and certainly much easier to set up between organizations.  This article is going to discuss the main complication we have with FTP - and that is being able to support both Active and Passive FTP.

Active and Passive explained


FTP works by creating a connection to a server.  This is a TCP connection, and it's usually on port 21, although this can change.  This connection is known as the CONTROL channel - it is the one which will send commands and receive replies.  When an instruction is sent to either retrieve a directory listing, or a file, or to send a file, a transfer session is negotiated and established - and this transfer is done in either Active or Passive mode.

Active

In active mode, the client - which is always the requestor, will send a PORT command to the server.  An example of a PORT command is as follows:

PORT 10,110,141,126,250,78

Open in new window


The client is telling the server that it's listening on IP address 10.110.141.126, and on port 64078.  You can calculate the port by using the last two integers, 250 and 78 and performing the following equation - 250 * 256 + 78.  The 256 will never change.

The server will then try to connect to the client at the IP address specified, and the port …
1
Goal:  To set up a secure SSH server for your home computer to make it accessible anywhere AND to use it as a port forwarding proxy.

Steps
1.  WinSSHD version 5 is free for personal use.  So download and install it.  You can download it from the link http://www.bitvise.com/download-area

2.  Create a new user with a very complex (containing characters from multiple sets like uppercase, lowercase, special characters, numbers..) password.  Assign permissions very carefully to this user.  Give full access only to one sandbox folder and as required, give read access to the other folders.

3.  Download WinSSHD Tunnelier (or some such SSH2 Client) and generate a client certificate key pair (public+private).  This would be the second level authentication for your server.

4.  In WinSSHD control panel, remove the Virtual Groups and Virtual Users (since we'll use the Windows authentication instead).

5.  Add your new Windows User to the Windows Users section and ensure you have chosen "Required" for password AND public key authentication.

6.  Assign the public key generated in step 3 to the user.

7.  Click OK to confirm your selection and apply the changes to the WinSSHD Server.

8.  Open port 22 in your firewall and your router (if you have blocked port accesses).  Haven't configured it yet?  Do so immediately :-).

9.  Use a SSH2 client to test the connection to ensure both levels of …
0
Samba is the de-facto standard program (or, more correctly: suite of programs) that UNIX and Linux systems use to share files with Microsoft Windows (and more recently, Mac OS-X) systems.

Currently, there are 2 common versions of Samba available, and they are designed for different tasks.
- Samba 3 is the long-standing "king" of solving the UNIX/Linux connection to Windows file sharing puzzle. Over the years, they have continued to keep up with a Microsoft development team that, until recently, was not only opposed to interacting with UNIX/Linux systems, but actually made implementation decisions designed to break the existing systems ability to connect. Fortunately, this is no longer the case, as Microsoft now shares their proprietary CIFS APIs with the Samba team, as well as many other companies and teams. The result has been a more robust and resilliant interface with even better performance - for all concerned!
 - Samba 4 was more than a decade in the making, with the sole intent of being able to replicate the Active Directory capabilities of Windows Server versions 2000 and later.  While it also can do basic file sharing, the primary purpose of Samba 4 is the Active Directory Server component.

For most Linux distrubutions, both Samba 3 and Samba 4 are available... but in my opinion, Samba 4 should be reserved for when you want the Active Directory Server component to work. Specifically, if all you want to do is share files, …
8
 
LVL 18

Expert Comment

by:Ravi Agrawal
Comment Utility
good insight
0
 

Expert Comment

by:SalisburyAdmin
Comment Utility
Thanks for the input, and the history lesson!
0
Problem: Windows 32bit running out of paging space.
Solution: Add additional page files on separate partitions.

Background:

By default Windows creates only one page file on the partition you install Windows on.

You may know that the maximum size page file for 32bit windows is 4GB. This means if you keep all the defaults and allow the page file to grow, it will grow to 4GB then stop. When it stops it may crash your operating system if it has run out of memory.

What I found is that it is a maximum of 4GB *per partition*.

So if you have three partitions, you could have three 4GB page files, effectively a 12GB of page space.

So the tip to avoid running out of page file space is to add additional page files, on separate partitions.




1

Server Software

7K

Solutions

17

Articles & Videos

11K

Contributors

A server is a computer program or a machine that waits for requests from other machines or software (clients) and responds to them. This architecture is called the client–server model. The clients may run on the same computer or may connect to the server over a network. The purpose of a server is to share data or hardware and software resources among clients. Typical computing servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.