Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 84 Next »

10%
System Center 2012 SP1: What's new?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
snvv, 123RF
If you want to use Windows Server 2012, Windows 8, Windows RT, Windows Phone 8, or Exchange Server 2013, then SQL Server 2012 and SharePoint 2013 also need a compatible monitoring and management
10%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
you use them. In the past, most admins relied on run-of-the-mill event monitoring with thresholds: If the incoming data volume exceeded a certain limit, the monitoring system sounded an alarm. If too
10%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
monitoring tools. The next step is to create and run the container for a user. As the sys admin, you create a user account and share the credentials for the user to access the Linux server. The objective
10%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
Administrators monitor key network connections to detect issues (e.g., congestion) at an early stage. The Simple Network Management Protocol (SNMP) is often used for this purpose to query
10%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
is not sufficient to ensure reliable detection of all current malware. New Methods To detect the propagation of this kind of malware on monitored networks, other detection methods, such as honeypots, are required
10%
The Azure Arc multicloud and on-premises management platform
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Chris Leipelt on Unsplash
One benefit of using Azure Management Services is that servers managed with Azure Arc are displayed as objects on the Azure portal. These servers can therefore be inventoried, updated, and monitored
10%
Phased Updates for Ubuntu 13.04
20.08.2013
Home »  News  » 
 
the user base and monitor the behavior of each update, so changes that cause problems can be suspended or reversed before they affect the entire user base. According to the new plan, which was announced
10%
OpenStack Serves Up Havana
29.10.2013
Home »  News  » 
 
the cloud environment through the OpenStack dashboard. The new OpenStack Metering feature provides a single source for monitoring usage data across OpenStack services. According to the OpenStack project
10%
StackIQ Updates Rocks+
23.02.2012
Home »  HPC  »  News  » 
 
the Linux operating system (Red Hat Enterprise Linux 6, CentOS 6, Oracle Linux 6), cluster management middleware, libraries, compilers, and monitoring tools. It features all the necessary software
10%
Bit9 Enhances Security Solution
11.10.2012
Home »  News  » 
 
, and ticketing systems. Bit9 also delivers enhanced memory protection, file integrity monitoring, and device control to provide a single solution across all enterprise systems. Version 7.0 is now available

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice