Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (133)
  • News (75)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 88 Next »

9%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
the cluster nodes. It assigns tasks to the available nodes and monitors their accessibility and availability. Figure 1: The architecture of a simple Storm
9%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
volume. Metering solutions such as PNP4Nagios attached to monitoring systems can hardly cope with such amounts of data, especially if classical databases such as MySQL are responsible for storing
9%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
for automatically monitoring a container fleet for security problems. They promise no less than an all-in package: The tools on offer check individual containers or connect directly to a local continuous integration
9%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
VMware products, such as NSX (for virtualization and security automation), vRealize Operations (for monitoring and capacity planning) or vRealize Log Insight (for log analysis). To be able to manage cloud
9%
Data security and data governance
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Maksim Kabakou, 123RF.com
protection: encryption, tagging, and other technologies for both storage and data transfer. Monitoring and analysis: continuous monitoring of access to and the use of data, and analysis to detect
9%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, configuration, and monitoring. This process is called DevOps. It’s new, broad in scope, and often confusing. This means that DevOps adoption comes with a minefield of potential mistakes. I’ll look at some common
9%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
Session Host, formerly Terminal Server, for small businesses or training centers that provides a way for users to connect a monitor, keyboard, and mouse directly to the server. The virtual desktops
9%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
with monitoring system state. Osquery encapsulates the state of the system as a relational database and then allows users to use SQL queries to explore this data from any angle. The results can be tailored
9%
Microsoft Active Directory Rights Management Services
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © vska, 123RF.com
. Logging AD RMS writes important information to the application, security, system, and AD RMS event logs on the AD RMS server. Some specific events that are critical to monitor are shown in Table 1
9%
Customizing PortSentry
30.03.2012
Home »  Articles  » 
 
, I’ll help you monitor all your ports and help you avoid banning your own user and admin IPs in the process. Incidentally, PortSentry heralds from those innocent and forgotten times and is well over

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 88 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice