Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 84 Next »

9%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
implement and monitor far stricter rules, which are then relaxed again during normal business hours. Even though a company's users are always portrayed as the highest risk vulnerability, they are really your
9%
Tech News
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
 
into their IT operations for infrastructure and applications has been diminished." This lack of visibility and monitoring capabilities leads to organizational gaps, says Kerner, including the ability to effectively conduct
9%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
administrative units by running the cmdlet Get-Command *AzureAD*AdministrativeUnit* When assigning administrative units to specific users or groups, user logons should be monitored. This also applies
9%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
-known example is the Prometheus time series database operator [2], which can be used to establish comprehensive monitoring, alerting, and trending (MAT) for an entire Kubernetes cluster (Figure 4
9%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
and monitoring systems can connect. Normal workstation PCs, on the other hand, have no reason to communicate directly with the back end of an application. For computer accounts, some services run
9%
The new version of Chef Automate comes with many new features
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Rock'n Roll Monkey on Unsplash
, it was not possible to monitor the roll-out of individual applications. Chef Automate was also not particularly well interwoven with other solutions from the CI/CD environment. Historically, when Chief development
9%
My Five Favorite Sys Admin Tools
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Roywylam and Hans Slegers, 123RF.com
Shell modules are available for Active Directory, Exchange, Hyper-V, VMware, and an array of other technologies. Pulseway: Pulseway is a sys admin's best friend. You can fully monitor and manage Windows, Mac
9%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
the clarity and streamlining of its architecture. An inherently immutable system that can be controlled and fully monitored from the outside by the API tends to make you want more, especially given
9%
Artificial admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Maxim Basinski, 123RF.com
, and even partially replacing human skills in operations with AI-supported automation [1]. Some administrators might be surprised. For many years, monitoring systems such as Nagios or Icinga have offered
9%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
. Changes can take place on any node and consistent synchronization is essential. The complexity of conflict resolution and the need for robust monitoring and management therefore pose challenges. Merge

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice