Deploying Rocket.Chat without Docker on CentOS 7

Screen Shot 2016-02-04 at 2.29.32 PM | | General Information, Help, Quick Tips

 

When it comes to business messaging platforms, you want to find a good balance between cost, features and security. Slack is great, but it’s a little pricey since it uses a pay-per-user model. Fortunately, there are messaging platforms that are feature-rich and won’t clean out your company piggy bank as your team grows.

Rocket.Chat is a free, self-hosted, open-source alternative to pricier messaging programs like Slack. Not only does it not impact the bottom line, it’s a secure platform that lets you control your chat history.

If you’d like to make the platform more secure, while also understanding what the application and all of its pieces are doing, you can try this method to deploy Rocket.Chat without using Docker on CentOS 7. Continue reading

Should I Document That? Effective Documentation Tips for Sysadmins

sysadmin documentation tips | | General Information, Guest Post, Industry Thoughts, Quick Tips
Guest Post: This is a guest post from Josh Reichardt, DevOps Engineer with about.me and the owner of Practical System Administration, where he writes about scripting, devops, virtualization, hardware and policies. Follow him on Twitter at: @Practical_SA.

If you have worked in IT for any period of time, you have likely heard about how important documentation is. However, if you’re just starting out in the industry, you may have no idea how to effectively “do” documentation.

Having spent the last 6 years in an administration/engineering role, I have learned a number of important lessons and developed a few techniques that have helped me write documentation in a clean, consistent and usable way.

This list is not meant to be a comprehensive solution, but more of a guide that allows you to pick and choose the pieces that are important or applicable in your environment and improve your documentation. Even if you already have a firm grasp on your documentation skills, I believe in looking for new and improved ways to do things — the more you know, the better.

Continue reading

Deal With Cloud Sprawl Today Before It Becomes a Problem Tomorrow

cloud sprawl bring your own cloud | | Back Up & Storage, Online Security

Cloud sprawl, otherwise known as Shadow Cloud or Bring Your Own Cloud, is an emerging problem for IT due to the growth of easy-to-set-up cloud providers. While typically a Shadow IT concern, it can also rear its ugly head thanks to a lack of IT policy and oversight into cloud usage.

What exactly is cloud sprawl? It’s unknown, unauthorized and unregulated cloud usage by the members of an organization.

cloud sprawl is huge - bring your own cloud - shadow cloudYou might think that for every 1 authorized cloud provider, you’d have 1-2 unauthorized cloud providers, meaning roughly 50% of your cloud usage is unauthorized.

Brace yourselves, because in all actuality, more than 80% percent of your current cloud providers are probably unauthorized per Cisco. For some companies, it can be 25 times what they estimated according to recent surveys.

All this said, it’s important to tackle this problem ASAP, before it becomes an unwieldy nightmare tomorrow. Continue reading

What is Secure File Management? The 5 Features You Need

secure file management | | File Management, File Sharing

Businesses seek out enterprise-level file management platforms for many reasons. One is ease-of-use in sharing files, another is to have a unified place for server and cloud storage and yet another is to have a backup option in case of disaster.

But most importantly, businesses look for file management platforms because they offer a secure solution for the sensitive data that comes and goes from their organizations every day.

How is it these platforms keep data and files secure?

Continue reading

From Clinton’s Server to Your Office: The Insidious Effects of Shadow IT

Identifying Shadow IT | | Back Up & Storage, General Information, Help

It all started with a home-based server. A home-based server that carried state secrets.

Up until the most recent occupant, few others in the position of Secretary of State had used the official state.gov email address to conduct government business. This was pretty typical of the holders of this office. However, most former Secretaries of State didn’t rely on a private server, hosted in a Chappaqua home, to conduct official government business.

Continue reading