473,396 Members | 1,895 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Minimum Skill for a System Admin

Hi Dudes,

Please help by advising me on

1. What are the minimum technical skills a fresh Linux System Admin should posses ?

2. In what way they could tuneup their skills ?

Regards,
Allwyn
Mar 20 '08 #1
4 1567
micmast
144 100+
Since I'm not a professional linux user, I cannot answer the first question, but I think the answer to the second question would be: play with it

I believe an administrator should tweak the systems to the max, to the point where they actually break. Then the admin needs to take a step back and figure out what went wrong, I believe that way he/she will understand how it works and how it should be configured for best use.
Mar 20 '08 #2
sicarie
4,677 Expert Mod 4TB
It's kinda rude to post the same question twice. It clutters up the forum, and as you can see, the same people who replied to you before are replying to you now.

This looks a lot like a "Sysadmin 101" homework question ('What are the daily roles and responsibilities of a systems administrator?'), and per our homework policy we're not allowed to just give you the entire answer, why don't you post what you think they are, and we can help augment that list.

(I'm also doubting you are really in this position as you would have 1) a boss telling you what to do, 2) system users asking you if you can set stuff up for them, and 3) have come from an entry-level position - which are usually in place so that people who are clueless aren't put in a position they can't handle yet)
Mar 20 '08 #3
Since I'm not a professional linux user, I cannot answer the first question, but I think the answer to the second question would be: play with it

I believe an administrator should tweak the systems to the max, to the point where they actually break. Then the admin needs to take a step back and figure out what went wrong, I believe that way he/she will understand how it works and how it should be configured for best use.


Thank you for the reply
Mar 20 '08 #4
It's kinda rude to post the same question twice. It clutters up the forum, and as you can see, the same people who replied to you before are replying to you now.

This looks a lot like a "Sysadmin 101" homework question ('What are the daily roles and responsibilities of a systems administrator?'), and per our homework policy we're not allowed to just give you the entire answer, why don't you post what you think they are, and we can help augment that list.

(I'm also doubting you are really in this position as you would have 1) a boss telling you what to do, 2) system users asking you if you can set stuff up for them, and 3) have come from an entry-level position - which are usually in place so that people who are clueless aren't put in a position they can't handle yet)

If u think, this clutters the Forum, I apologize. And if this Forum has only Experts...., then I need to be here. Thank you
Mar 20 '08 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

1
by: Vikrant | last post by:
On my DB2/UDB system, some tablespace 'Minimum recovery time' is 2000-11-19 or some '1999-10-04' or different, for some tablespace theres is no 'Minimum recovery time' , what does it tell me? ...
25
by: Mike MacSween | last post by:
Yes, I've downloaded and read the FAQ. And searched the archives. I'm just treading a little carefully here because of the caveats about locking myself out of the db forever. Some answers I could...
3
by: Tom van Stiphout | last post by:
We secured an Access MDB for a client, using the Access 2000 (or above - still trying to find that out) security wizard. I trust the developer who did this, and the screendumps of the process don't...
9
by: Ben Dewey | last post by:
Project: ---------------------------- I am creating a HTTPS File Transfer App using ASP.NET and C#. I am utilizing ActiveDirectory and windows security to manage the permissions. Why reinvent...
4
by: m96 | last post by:
hi, i'm trying to make a query to a ldap server (version v2 or v3 doen't matter) with c#. the query works just fine but the problem is that i can't read the custom attributes/fields, since .net...
1
by: Brian | last post by:
I've looked through the previous posts on this one and have verified permissions and location of my Dlls, but I am still getting an exception when I try to Load an assembly. The directory where...
7
by: Fresh Air Rider | last post by:
Hi I understand that ASP.net 2.0 (Whidbey) is going to reduce coding by 70%. Surely this is going to de-skill or dumb down the developers task and open up the task to less qualified and...
3
by: Stan | last post by:
ASP.NET site runs under Windows Authentication, Anonymous Access is unchecked. Page tries to create NET component (regular assembly, not ES) and fails with 'Access Denied' We don't want to give...
3
by: manxie | last post by:
Dear All Readers, I'm supposed to create a program with a switch and using voids to execute number of codes, that includes finding sum, average, maximum, and minimum, please read my code:...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.