Avatar photo
By: Juan Herrera Utande

April 29, 2024 10:28 pm

1,937 views

Avatar photo
By: Alexander Bergmann

February 17, 2021 9:46 pm

6,567 views

SLES 15 Security Technical Implementation Guide (STIG)

We are proud to announce that DISA, the Defense Information Systems Agency, published a Technical Implementation Guide (STIG) for SUSE Linux Enterprise Server 15. A public announcement from DISA can be found here. The SLES 15 STIG can be downloaded directly from the DISA web page over here. Background: DISA is a parent agency of […]

Read More


Avatar photo
By: Bernd Schubert

November 10, 2020 10:21 am

8,794 views

A New SUSE SAP Business One installer image is ready

Following our motto „We adapt you succeed“ together with our IHV‘s and SAP we have refreshed the installer image for SAP Business One. First of all many thanks to all IHV‘s which have validated the new installer image. They went the extra mile with us and make this happen. I‘d like […]

Read More


Avatar photo
By: Lawrence Kearney

December 4, 2019 11:08 am

10,477 views

PDSH, SLE, and SLURM

Managing many systems from one is a basic need for system administrators. A need which has obvious development commonality judging from the myriad tools available that delegate work to other systems. Often the criteria used to target systems for management is understandably inflexible. Directory service management consoles and configuration management systems are good examples of […]

Read More


Avatar photo
By: Christian Holsing

March 28, 2019 1:43 pm

9,628 views

SUSE Linux Enterprise Server 15 validated for SAP workloads

A few weeks ago, SAP finished the validation of SLES and SLES for SAP Applications for SAP workloads. This enables customers to upgrade to SLES 15 and SLES for SAP Applications 15 on their systems running SAP workloads and continue to run on a certified and tested infrastructure. The validation was previously already available for […]

Read More


Avatar photo
By: Lawrence Kearney

November 27, 2018 2:06 am

10,279 views

Deploying SLURM PAM modules on SLE compute nodes

Security in High Performance Computing (HPC) environments has always been a proposal of relativity. Striking a balance between implementing an adequate level of security and not interfering with “getting the science done”. In the simplest terms the primary security realms HPC systems and clusters are exposed to are environmental and user facing. More specifically […]

Read More


Avatar photo
By: Lawrence Kearney

July 16, 2018 3:22 am

13,521 views

Deploying SLURM using SLE HPC patterns

The expansion of High Performance Computing (HPC) beyond the niches of higher education and government realms to corporate and business computing use cases has been on the rise. One catalyst of this trend is increasing innovation in hardware platforms and software development. Both respectively drive down the cost of deploying supercomputing services with each iteration […]

Read More