Category Archives: Configuration Management

Encryption and Virtualization in Configuration Management

Virtualization and encryption are two distinct technologies which can be used to improve the reliability and security of configuration management. Learn the benefits of each, and get an introductory tutorial on their usage. Continue reading

Posted in Configuration Management, Security & Privacy, Tech | Tagged , , | Leave a comment

The “prestigious Partner Advisory Board” is calling. Should I Answer?

I’ve recently received an email saying “Congratulations — you have been chosen by IPED current constituents to become a member of the prestigious Partner Advisory Board exclusively for solution providers. ” It goes on to say that by by participating, … Continue reading

Posted in Configuration Management | Leave a comment

Configuration Management – 4 Key Concepts

This article was originally published by Triond on their web site ComputerSight. I thought it was time to reprint it here, so it appears below in its entirety. Configuration Management (‘CM’ hereafter) means a lot of different things to different … Continue reading

Posted in Configuration Management, Publications, Security & Privacy, Tech | Leave a comment

Creating an Easy Lookup Table in a Shell Script

As a Configuration Manager, I’m always looking for ways to improve the automation of the builds and deployments of my company’s applications. We use scripts to compile the apps, replace certain token strings with environment-specific values, and copy the new … Continue reading

Posted in Configuration Management, Publications, Tech | Leave a comment

Using Secure Shell to Tunnel Through Firewalls

Use Secure Shell (SSH) to establish safe, encrypted internet connections through a firewall. With this method, you don’t have to open additional ports through your firewall in order to access external email accounts, access usenet newsgroup servers, and multimedia streams, … Continue reading

Posted in Configuration Management, Publications, Tech | 4 Comments

More Secure Shell troubles

Well, I still haven’t solved the earlier problems (see other posts in this category), but now I’m having a new problem. One of the Windows servers we’ve had OpenSSH running on for quite some time suddenly seems have issues. It … Continue reading

Posted in Configuration Management, Tech | Leave a comment

Some Shell Script Basics for deploying via Secure Shell

I recently ran a training session teaching some Configuration Management (CM) personnel some of the basic UNIX/linux shell commands, along with some of the common ways Secure Shell (SSH) utilities can be used to move application code around during deployments. … Continue reading

Posted in Configuration Management, Tech | 3 Comments

Secure Shell for Release Deployment – Trials & Tribulations (Continued)

The “Could not create an instance of the CmdLib object. Please register the Microsoft.CmdLib component.” error message was because of certain web server extensions that weren’t installed. I think the SQL Server Reporting Server needed to be installed. In any … Continue reading

Posted in Configuration Management, Tech | Leave a comment

Secure Shell for Release Deployment – Trials & Tribulations

Recently it was decided at the large State government facility where I work that Secure Shell (SSH) would be used to facilitate the deployment of application software to the servers. This approach has a number of advantages. All data transfers … Continue reading

Posted in Configuration Management, Tech | 2 Comments

Secure Shell Quickie

While waiting for Associated Content to publish the Charity Music article (something they’ve now agreed to do), I wrote a quick little overview of SSH and published it on Helium, where it’s now rated #1 of 2. What is SSH? … Continue reading

Posted in Configuration Management, Publications, Tech | Leave a comment

Recent Articles published elsewhere

Configuration Management: 4 Key Concepts Choosing a Construction Contractor

Posted in Configuration Management, Publications | Leave a comment