Footnotes

Preface

1 Throughout the book, we refer to the end users of our systems as customers rather than users. A detailed explanation of why we do this is in Section 31.1.2.

Chapter 2

1 A cheap substitute is to have a checklist with detailed instructions, including exactly what options and preferences are to be set on various applications and so on. Alternatively, use a disk-cloning system.

Chapter 3

1 “To err is human; to really screw up requires the root password.”—Anonymous

2 Thus, an Intel Xeon running SUSE 10 and configured as a web server would be considered a different platform from one configured as a CAD workstation.

3 This is not to imply that automation removes the need for documentation.

4 SAs should note that this method relies ...

Get The Practice of System and Network Administration, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.