Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 84 Next »

9%
Storage innovations in Windows Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liubomirt, 123RF.com
of Hyper-V (usually in the form of a Hyper-V failover cluster with multiple nodes) and a scale-out file server, the entire environment can be monitored and controlled. By default, the system ensures that
9%
Four solutions for Prometheus long-term storage
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sidewaypics, 123RF.com
-hardened Prometheus admins will probably disagree at this point because, as good as Prometheus might be for collecting basic data for trending and supporting monitoring on the basis of individual events, the work
9%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
software, you can get DDoS protection "off the web," which does not refer to another provider in the sense of as-a-service, but rather a monitor that detects unusually high traffic flows on switches
9%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
the components that play a role in terms of security and compliance and see where Kubescape enters the scene when you want to monitor these components. The components of Kubernetes (K8s) are defined and obvious
9%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
is now complete, and the server is replicated in the Azure environment. The first replication takes some time, and the different states are displayed in Azure. Monitoring Replication The recovery service
9%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
. Monitoring and Logging Network security also involves monitoring, for which Google provides a number of on-board tools. At this point, I'll look at VPC Flow Logs and Firewall Logs, in particular. VPC Flow
9%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
of an application, act as load balancers, and have their own monitoring system for the configured targets. If you use Istio in the MariaDB scenario described above, not only does the database continue to run smoothly
9%
Data deduplication on Windows Server 2022
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © iofoto, Fotolia.com
use the following PowerShell command to discover the scheduled tasks: Get-ScheduledTask -TaskPath \Microsoft\Windows\Deduplication\ Get-DedupStatus lets you monitor the deduplication rate and savings
9%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
their Collax Business Server. In this menu you will also find an entry for updating the antivirus scanner. If you are looking for more information about the server, you will find it under Logging/Monitoring
9%
Selecting Compilers for a Supercomputer
21.12.2017
Home »  HPC  »  Articles  » 
at the LRZ in the application support group and mainly deals with performance monitoring and energy optimization of high-performance computing applications. In this context, she programs system-wide tools

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice