Academia.eduAcademia.edu

System Administration

description88 papers
group7,121 followers
lightbulbAbout this topic
System Administration is the management and maintenance of computer systems and networks, ensuring their optimal performance, security, and reliability. It involves configuring hardware and software, monitoring system performance, troubleshooting issues, and implementing updates and backups to support organizational IT infrastructure.
lightbulbAbout this topic
System Administration is the management and maintenance of computer systems and networks, ensuring their optimal performance, security, and reliability. It involves configuring hardware and software, monitoring system performance, troubleshooting issues, and implementing updates and backups to support organizational IT infrastructure.

Key research themes

1. How can automation and agent-based architectures reduce complexity and cost in system administration?

This theme focuses on leveraging automation and intelligent software agents to streamline repetitive, procedural tasks in system administration. The rationale is that manual administration is increasingly costly and error-prone, and scalable automated solutions can improve efficiency and resource management across multi-platform networks.

Key finding: The paper introduces ABSA, an architecture using stationary and mobile software agents to automate and distribute system administration tasks in multi-platform network environments. It demonstrates that agent autonomy and... Read more
Key finding: The study highlights how automation, AI, and orchestration tools like Kubernetes are transforming system administration by enabling consistent configuration management, faster recovery, scalability, and cost reductions. It... Read more
Key finding: Through empirical evaluation, the study evidences significant productivity improvements using centralized control systems for end-user computer management, with Windows Server Remote Access achieving a 333% increase over... Read more

2. What are the social and human factors influencing system administration work and how can they inform safer, equitable environments?

This research area investigates the lived experiences, coordination mechanisms, and gender dynamics of system administrators (sysadmins), emphasizing the often invisible, care-intensive nature of their work. The studies recognize socio-technical complexity beyond automation, advocating for workplace policies fostering inclusion, equity, and recognition of sysadmins' multifaceted roles to improve both human well-being and system security outcomes.

Key finding: Through empirical qualitative research with sysadmins, this study identifies coordination mechanisms underlying sysadmin work, highlights increased formalization during crises (e.g., COVID-19), and exposes the 'double... Read more
Key finding: Employing feminist research methods with non-cis-men sysadmins, this paper reveals additional care work, gender-related identity labor, and community-building efforts required for marginalized genders. The findings underscore... Read more
Key finding: Based on interviews with 24 sysadmins, the work uncovers how the COVID-19 pandemic altered sysadmins' coordination patterns, increasing formal processes while enabling remote work support. The study models coordination... Read more

3. How do coordination challenges affect timely and secure software patch management in complex systems?

This theme examines the socio-technical coordination processes that underpin software security patch management, especially in mission-critical domains. It highlights how interdependencies among stakeholders and technical components contribute to delays, and proposes grounded theory insights into constraints, breakdowns, and coordination mechanisms that can better support patch deployment and reduce vulnerabilities.

Key finding: This paper presents a grounded theory developed from 51 patch meetings involving 21 industry practitioners. It identifies four dimensions—causes, constraints, breakdowns, and mechanisms—that explicate how coordination needs... Read more
Key finding: Offering the first empirical, grounded theory account of coordination in patch management, this study elucidates how insufficient understanding of technical and human interdependencies leads to delays. It underscores the... Read more
Key finding: Reinforcing prior insights, this study details mechanisms—such as communication, shared situational awareness, and formalized procedures—that mitigate coordination breakdowns and constraints in patch management. It provides... Read more

All papers in System Administration

Abstrak Jaringan Komputer merupakan suatu jaringan yang dapat menghubungkan satu komputer dengan komputer lain atau teridiri dari beberapa komputer yang saling terhubung sehingga memungkin antara beberapa komputer tadi dapat saling... more
This material outlines the technical steps required to configure a MikroTik router for optimal internet connectivity. The main focus includes configuring static IP addresses, setting up static routing, configuring DNS servers, and... more
Studies indicate that because of the difficulty and complexity, the cost of administering systems is ten times the cost of the actual hardware. ABSA is an agent-based solution to automated system administration. ABSA architecture is... more
Remote system administration is usually performed according to the standard client-server model. However, important security and flexibility limitations, arising from the usage of a predictable access port for such a critical application,... more
To better implement these systems and motivate users to contribute knowledge, we must better understand how different types of users actually employ an EKR. While a simplistic view might consider an individual's level of EKR usage as... more
Organizations dedicate considerable resources to developing software tools and often utilize usability studies to improve their products. Unfortunately, usability studies can be costly and some companies are using internal employees as... more
Scalability, cost-effectiveness, and security are all advantages of cloud computing, which has become an indispensable component of financial applications. The optimization of infrastructure to enhance performance, reduce expenses, and... more
In today's digital age, cybersecurity has become a critical component of every business operation. With increasing cyber threats, organizations must take proactive measures to safeguard their sensitive data and IT infrastructure. Managed... more
This research paper investigates the effectiveness of centralized control systems for managing multiple end-user computers from a single hub. Through qualitative analysis involving eight participants with diverse technical backgrounds,... more
The increasing adoption of cloud computing has led to the widespread use of virtualization technologies, with Docker containers and Virtual Machines (VMs) emerging as dominant solutions. This study presents a comparative analysis of... more
Seiring berkembangnya teknologi, kebutuhan akan media penyimpanan yang berkapasitas besar dan akses yang cepat sangat dibutuhkan baik itu pada perangkat smartphone maupun komputer praktis. Network Attached Storage (NAS) merupakan... more
Enterprise application performance determines business success levels because these systems enable decisive operational functions and decision processes. Cloud computing is an innovative management solution that provides adaptable... more
The field of system administration is undergoing significant transformation, driven by the integration of emerging technologies. Innovations such as automation, cloud computing, artificial intelligence (AI), and containerization are not... more
Untuk pemberian IP pada Mikrotik Routerboard dilakukan secara otomatis (dhcp) dan manual (static), namun untuk terkoneksi ke Internet Mikrotik menggunakan dhcp client karena IP sudah diberikan laboratorium dan jika diganti secara static... more
This paper presents the development of algorithm on Policing and Shaping Traffic for bandwidth management which serves as Quality of Services (QoS) in a Campus network. The Campus network is connected with a 16 Mbps Virtual Private... more
Guru Teknik Komputer dan Jaringan, tanggung jawab, keahlian, dan pencapaian yang diemban mencakup berbagai aspek pengajaran serta pengembangan keterampilan teknis yang mendalam pada siswa.
Big data is massive and messy and it's generated at a very fast rate. These characteristics pose a problem for data storage and processing, but focusing on these factors has resulted in a lot navel-gazing. The data which are generated by... more
Microsoft Windows operating systems internals are so may; even with the variety of operating systems' distributions available in the market. Beneficial, useful, and trustworthy to do all the tasks much more easy, they are making the life... more
Penerapan dan perancangan Virtual Local Area Network (VLAN) bisa menjadi solusi yang efektif dalam meningkatkan efektivitas dan keamanan jaringan di sekolah maupun perusahaan. VLAN memungkinkan pemisahan jaringan fisik menjadi beberapa... more
Recently there has been an increasing market demand to provide metropolitan and longer-reach Ethernet connectivity. According to a Yankee Group estimate, in 2001 the market for virtual private network (VPN) services over traditional (ATM... more
In the era of big data and cloud computing, the performance and efficiency of database systems have become critical factors in the overall performance of information systems. This paper presents a comprehensive review of self-tuning... more
In the era of big data and cloud computing, the performance and efficiency of database systems have become critical factors in the overall performance of information systems. This paper presents a comprehensive review of self-tuning... more
In the era of big data and cloud computing, the performance and efficiency of database systems have become critical factors in the overall performance of information systems. This paper presents a comprehensive review of self-tuning... more
In this paper, a new routing algorithm based on a flooding method is introduced. Flooding techniques have been used previously, e.g. for broadcasting the routing table in the ARPAnet [1] and other special purpose networks [3][4][5].... more
Advancements in computer technology have revolutionized data management, providing enhanced efficiency, accessibility, and accuracy. Despite these advancements, many churches in Liberia still rely on manual methods to manage membership... more
Salah satu permasalahan utama yang dihadapi oleh siswa di SMAN 1 Cikeusal adalah keterbatasan akses internet di rumah. Banyak siswa yang tidak memiliki perangkat komputer atau laptop yang memadai, serta kuota internet yangterbatas. Ini... more
The electroencephalogram (EEG) is a record of the oscillations of brain electric potentials, reveals the synaptic action that strongly co-relate with brain state. In this paper we tried to understand the changes in brain by analyzing... more
DD FORM 1473i.14 MAR 13 AER Id,i,on rely be used unl,I exllllalil_l-SECU'RILV CLASIIFli_ATIQN QI: fill i i*A_l ALl olhit (_liliOnl Ire Oblmlete.
Quality of Services in Multi-protocol layer switching for Virtual Private Network (MPLS-VPN) is one of important matter today. These networks experienced an increase of bandwidth size for enterprises LAN which are faster than the... more
In the present era, Cybercriminals are increasingly focusing their attention on the local networks of Small Medium Enterprise (SMEs). Due to the lack of resources and skilled workers in the cybersecurity field., SMEs struggle to prevent... more
Clustering can be defined as the process of partitioning a set of patterns into disjoint and homogeneous meaningful groups, called clusters. The growing need for distributed clustering algorithms is attributed to the huge size of... more
Microarray technology is one of the important biotechnological means that has made it possible to simultaneously monitor the expression levels of thousands of genes during important biological processes and a cross collections of related... more
berbasis paket. Software ini memiliki kelebihan-kelebihan untuk mendisain jaringan berdasarkan perangkat yang ada di pasaran, protokol, layanan dan teknologi yang sedang populer di dunia telekomunikasi. Disini disimulasikan suatu model... more
As cyberattacks become more sophisticated and frequent, small and medium-sized businesses (SMBs) are increasingly at risk. Unlike large corporations, SMBs often lack the resources to implement comprehensive IT security measures, making... more
Perkembangan teknologi pada akhir-akhir ini semakin pesat dengan bertambahnya waktu juga disusul dengan perkembangan internet yang semakin canggih, sekolah adalah salah satu instansi yang ikut serta dalam perkembangnan teknologi tersebut... more
Recently there has been an increasing market demand to provide metropolitan and longer-reach Ethernet connectivity. According to a Yankee Group estimate, in 2001 the market for virtual private network (VPN) services over traditional (ATM... more
Quality of Service (QoS) techniques are applied in IP networks to utilize available network resources in the most efficient manner to minimize delays and delay variations (jitters) in network traffic having multiple type of services.... more
The concept of quality of service (QoS) is a new computer technology. Previously, there was a slow internet connection to access the sites and it was slow to send information. But now, it requires speeding up the traffic and increasing... more
Pandemi COVID-19 berdampak pada diberlakukannya Pembatasan Sosial Berskala Besar atau PSBB. Salah satu implementasi dari PSBB adalah dengan dilaksanakannya proses belajar mengajar secara Online atau daring. Sekolah secara daring memang... more
Differentiated Services (DiffServ) is an important mechanism for providing quality of support on Internet. Even though DiffServ has demonstrated its stream classifications ability, the lack of an efficient network resource management... more
Today many routing system is used, from free (free) until the pay, from easy to difficult in the system configuration. One of them will be discussed is MikroTikRouterOS, the router operating system currently in use by the cafe-cafe,... more
Dewasa ini banyak sistem routing yang digunakan, dari yang gratis (free) sampai yang berbayar, dari mudah sampai yang susah dalam sistem konfigurasinya. Salah satunya yang akan kita bahas adalah MikroTikRouterOS, yaitu sistem operasi... more
As the digital landscape continues to evolve, safeguarding against cyber threats remains paramount. This paper conducts a comparative analysis of the security features inherent in two prominent operating systems, Windows and Ubuntu Linux.... more
Pada penelitian ini telah dirancang dan direalisasikan RT/RW-Net sebagai sistem yang berfungsi untuk mengakses jaringan internet. Sistem dibangun dengan menggunakan Router Mikrotik sebagai sistem operasi, access point sebagai penyalur... more
Penelitian ini akan menggunakan modem ADSL yang disetting bridge agar dapat memanfaatkan mikrotik sebagai PPoe client yang dapat terkoneksi langsung ke IP Public dengan username dan password yang diberikan oleh ISP pada setiap modem.... more
The Internet supports migration of code from node to node. A number of paradigms exist for distributed computing and mobile code, including client/server, remote evaluation, code-on-demand, and mobile agents. We find them... more
Download research papers for free!