Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 83 Next »

10%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
Distributed Object Store (RADOS). The ceph-mon cluster monitor monitors the function and configuration of the cluster nodes. It stores information about the placement of data and the general state
10%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
to make sense of the individual commands that Ceph now handles. The dashboard provides a much-needed bridge for the most basic tasks. Monitoring Hard Disks Although most administrators today want a flash
10%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
with the monitor plugin, which keeps track of the configured back ends and their availability; it also knows whether it is a master or slave. On the basis of this information, the MySQL back-end module finally sends
10%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
the cluster nodes. It assigns tasks to the available nodes and monitors their accessibility and availability. Figure 1: The architecture of a simple Storm
10%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
volume. Metering solutions such as PNP4Nagios attached to monitoring systems can hardly cope with such amounts of data, especially if classical databases such as MySQL are responsible for storing
10%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
for automatically monitoring a container fleet for security problems. They promise no less than an all-in package: The tools on offer check individual containers or connect directly to a local continuous integration
10%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
VMware products, such as NSX (for virtualization and security automation), vRealize Operations (for monitoring and capacity planning) or vRealize Log Insight (for log analysis). To be able to manage cloud
10%
Data security and data governance
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Maksim Kabakou, 123RF.com
protection: encryption, tagging, and other technologies for both storage and data transfer. Monitoring and analysis: continuous monitoring of access to and the use of data, and analysis to detect
10%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, configuration, and monitoring. This process is called DevOps. It’s new, broad in scope, and often confusing. This means that DevOps adoption comes with a minefield of potential mistakes. I’ll look at some common
10%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
Session Host, formerly Terminal Server, for small businesses or training centers that provides a way for users to connect a monitor, keyboard, and mouse directly to the server. The virtual desktops

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice