Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (770)
  • Article (136)
  • News (76)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 99 Next »

9%
What to Know Before Moving into HPC
08.04.2025
Home »  Articles  » 
that they should be learned when just getting started with Linux, and the same goes for HPC-specific situations. The ssh  command is a grand HPC command that you use as part of setting up, using, and monitoring HPC
9%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
interval="0" timeout="60" 06 op stop interval="0" timeout="60" 07 op monitor start-delay="0" interval="1200" 08 meta resource-stickiness="0" failure-timeout="180" Listing 2 STONITH
9%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
includes tools such as dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy, which passively monitor networks for data of interest. The arpspoof, dnsspoof, and macof tools help intercept network
9%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
network traffic do not block the network. Many admins use their own servers for the monitor servers (MONs), the guard dogs that monitor the cluster and enforce its quorum; however, MONs require virtually
9%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
implement and monitor far stricter rules, which are then relaxed again during normal business hours. Even though a company's users are always portrayed as the highest risk vulnerability, they are really your
9%
Tech News
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
 
into their IT operations for infrastructure and applications has been diminished." This lack of visibility and monitoring capabilities leads to organizational gaps, says Kerner, including the ability to effectively conduct
9%
Delegate and restrict authorizations in Azure AD
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © lassedesignen, 123RF.com
administrative units by running the cmdlet Get-Command *AzureAD*AdministrativeUnit* When assigning administrative units to specific users or groups, user logons should be monitored. This also applies
9%
Kubernetes containers, fleet management, and applications
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Murilo Viviani on Unsplash
-known example is the Prometheus time series database operator [2], which can be used to establish comprehensive monitoring, alerting, and trending (MAT) for an entire Kubernetes cluster (Figure 4
9%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
and monitoring systems can connect. Normal workstation PCs, on the other hand, have no reason to communicate directly with the back end of an application. For computer accounts, some services run
9%
The new version of Chef Automate comes with many new features
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Rock'n Roll Monkey on Unsplash
, it was not possible to monitor the roll-out of individual applications. Chef Automate was also not particularly well interwoven with other solutions from the CI/CD environment. Historically, when Chief development

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice