Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 96 Next »

12%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
enjoyed a quick win – they built a cluster in a matter of minutes – but that cluster failed to provide resilient telephony services in real-world scenarios. A PBX cluster must monitor, measure, and control
12%
Six new security features for  Windows Server 2022
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
because it forms the basis for another component of the Secured-core server: system monitoring. Microsoft Defender System Guard System Guard is a component of Microsoft Defender and follows the "assume
12%
Synchronizing repository changes with GitOps
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
, continuously monitor the state of the system and compare it with the declared desired state in the Git repository. Whenever a discrepancy is detected, these agents act to reconcile the differences, thus ensuring
12%
Build a secure development and production pipeline
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Félix Prado on Unsplash
for attackers if they aren't regularly updated or monitored. Improper configurations of your cloud platform, CI/CD tools, and weak access restrictions can also pose security threats. Lack of Compliance Failure
12%
Extending OpenNebula with hooks
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Greg Epperson, Photocase.com
SSH server. Figure 2: The dashboard displaying important system parameters at the top, such as a simple monitoring view of the hosts (left) and virtual
12%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
a great deal of information. Tracing will produce data such as how much wall clock time was spent in a routine or a set of nested loops. Profiling goes beyond this to monitor the system while
12%
Two NexentaOS derivatives compared
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© iofoto, fotolia.com
Logging Yes Resource monitor Yes SNMP Yes S.M.A.R.T data No Internal apps No Lights-out management IPMI Port trunking
12%
Proactive threat detection
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © dunord, 123RF.com
and sophisticated, defenses need to keep pace. Proactive monitoring of network traffic has been the order of the day for some time now. Partly in the wake of AI, this approach involves identifying unusual activity
12%
Insider Threats
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Seasons, 123RF.com
can't tie their hands. We can't unplug their computers or disable their WiFi connections. We can't place a force field around their laptops. And we can't seem to successfully educate them in the ways
12%
News for Admins
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
 
market dominance, the company needs to build a case for the presence of full-featured laptop and desktop PCs, rather than lighter and simpler tablet systems. The new processors are designed to work

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice