Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (758)
  • Article (135)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 98 Next »

10%
StackIQ Updates Rocks+
23.02.2012
Home »  HPC  »  News  » 
 
the Linux operating system (Red Hat Enterprise Linux 6, CentOS 6, Oracle Linux 6), cluster management middleware, libraries, compilers, and monitoring tools. It features all the necessary software
10%
Bit9 Enhances Security Solution
11.10.2012
Home »  News  » 
 
, and ticketing systems. Bit9 also delivers enhanced memory protection, file integrity monitoring, and device control to provide a single solution across all enterprise systems. Version 7.0 is now available
10%
Kaspersky Releases PURE 2.0 Total Security
04.04.2012
Home »  News  » 
 
intuitive to use. The advanced technologies offer immediate, proactive protection from known malware and monitors and blocks any suspicious behavior that could be caused by unknown malware attempting
10%
Amazon Announces Redshift Data Warehouse Service
06.12.2012
Home »  News  » 
 
According to the announcement, Amazon Redshift handles all of the work of setting up and managing a data warehouse – including such tasks as provisioning capacity, monitoring and backing up
10%
Fedora 19 Released
08.07.2013
Home »  News  » 
 
LMI management infrastructure has expanded to include new monitoring and configuration options.
10%
Secret Windows Attack Exists Only in the Registry
05.08.2014
Home »  News  » 
 
editor. The best shot at prevention is to catch the Windows document before it is executed. Otherwise, the only options are to monitor the system for suspicious behavior (after it is already infected
10%
Intel Releases Extreme Desktop Processor
02.09.2014
Home »  News  » 
 
, “Using new overclocking and monitoring features in Alienware Command Center 4.0, we’ve been able to really push the processors to the fullest extent and are seeing impressive overclocking headroom
10%
Ransomware Infects 625,000 Systems
02.09.2014
Home »  News  » 
 
and control center, allowing them to monitor the malware’s behavior and estimate the extent of its reach. Although the CryptoWall code is not as sophisticated as some ransomware alternatives, and the money
10%
XSEDE Project Up and Running
17.10.2011
Home »  News  » 
 
to the website, the XSEDE User Access Layer provides a comprehensive view of the resources available -- not just those at XSEDE partner sites, but any resources. It integrates authentication and job monitoring
10%
XSEDE Project Up and Running
11.11.2011
Home »  HPC  »  News  » 
 
to the website, the XSEDE User Access Layer provides a comprehensive view of the resources available -- not just those at XSEDE partner sites, but any resources. It integrates authentication and job monitoring

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice