Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 83 Next »

9%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
the components that play a role in terms of security and compliance and see where Kubescape enters the scene when you want to monitor these components. The components of Kubernetes (K8s) are defined and obvious
9%
Hyper-V failover with Azure Site Recovery
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © crazymedia, 123RF.com
is now complete, and the server is replicated in the Azure environment. The first replication takes some time, and the different states are displayed in Azure. Monitoring Replication The recovery service
9%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
. Monitoring and Logging Network security also involves monitoring, for which Google provides a number of on-board tools. At this point, I'll look at VPC Flow Logs and Firewall Logs, in particular. VPC Flow
9%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
of an application, act as load balancers, and have their own monitoring system for the configured targets. If you use Istio in the MariaDB scenario described above, not only does the database continue to run smoothly
9%
Data deduplication on Windows Server 2022
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © iofoto, Fotolia.com
use the following PowerShell command to discover the scheduled tasks: Get-ScheduledTask -TaskPath \Microsoft\Windows\Deduplication\ Get-DedupStatus lets you monitor the deduplication rate and savings
9%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
their Collax Business Server. In this menu you will also find an entry for updating the antivirus scanner. If you are looking for more information about the server, you will find it under Logging/Monitoring
9%
Selecting Compilers for a Supercomputer
21.12.2017
Home »  HPC  »  Articles  » 
at the LRZ in the application support group and mainly deals with performance monitoring and energy optimization of high-performance computing applications. In this context, she programs system-wide tools
9%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
for starting, executing, and monitoring work (normally a parallel job) on the set of allocated nodes.” “… it arbitrates contention for resources by managing a queue of pending work.” These three points
9%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
) you can use to customize your installation [2]. Watchman has two ways in which you can tell it which directories it must monitor and what actions it has to take: via the command line while the daemon
9%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
cases. With older WLAN components from this provenance, however, switching to the monitor mode often does not work, so these components are of very limited use for analysis purposes. When installing Kali

« Previous 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice