Your search did not match any results.
We suggest you try the following to help find what you’re looking for:
Virtualization is a key technology used in datacenters to optimize resources. As IT needs continue to evolve, virtualization can no longer be regarded as an isolated technology to solve a single problem.
Installing Weblogic with Chef
Want to learn how to create a simple Weblogic Cluster on a virtual machine with two managed servers using Chef? Read this post by C2B2 principal consultant Alan Fryer.
posted Thu, 19 Mar 2015 13:44:38 +0000
If you install Oracle Database 12c in a non-global Oracle Solaris 11 zone, you get database isolation, simplified resource control, and the ability to reduce licensing costs. Ginny Henningsen and Glynn Foster provide step-by-step instructions.
posted Tue, 24 Feb 2015 17:37:37 +0000
Oracle Solaris Kernel Zones provide all the flexibility, scalability, and efficiency of Oracle Solaris Zones while adding the capability to have zones that have independent kernels. This article discusses best practices for deploying kernel zones.
posted Thu, 08 Jan 2015 15:15:06 +0000
Docker allows you to create reusable containers with applications in them. These can be distributed, will run on several platforms, and are much smaller than the equivalent virtual machine images. Learn more in this article from Mark Nelson, Edwin Biemond, and Joel Nation.
posted Mon, 17 Nov 2014 19:01:48 +0000
This document describes hard partitioning with Oracle Solaris Zones (also known as Oracle Solaris Containers), and how to use it to conform to the Oracle licensing policies for partitioned environments.
posted Thu, 30 Oct 2014 13:34:58 +0000
Oracle VM offers flexibility in the assignment of I/O networking resources to domains. With this flexibility comes a wide range of performance possibilities. This article provides guidance regarding the most suitable configuration for certain workloads.
posted Mon, 25 Aug 2014 15:52:00 +0000
When you build a private cloud, you need to protect sensitive data not only while it's in storage, but also during transmission
between servers and clients, and when it's being used by an application. When a project is completed, the cloud must securely
delete sensitive data and make sure the original data is kept secure. These are just some of the many security precautions
a sysadmin needs to take to secure data in a cloud infrastructure. Orgad, Ron, and Richard and explain the rest and show you
how to employ the security features in Oracle Solaris 11 to protect your cloud infrastructure. Part 2 of a three-part article
on cloud deployments that use the Oracle Solaris Remote Lab as a case study.
posted Mon, 18 Aug 2014 22:43:12 +0000
Oracle ACE Director Lucas Jellema gets you there in 10 steps.
posted Tue, 29 Jul 2014 14:41:52 +0000