Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (666)
  • Article (152)
  • News (95)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 92 Next »

12%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
. For initial testing, Karma also launches the code, if so required, in a PhantomJS instance running without a GUI (headless operation). Karma also monitors the code and automatically re-executes the stored tests
12%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
, because it distributes the attack over several systems, making the connection somewhat more difficult for security information event monitor (SIEM) and intrusion detection tools to discover. To listen
12%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
to access the processed data. SQL Server 2016 also monitors and optimizes queries via the Query Store and can store them for later use. SQL Server 2016 is optimized for use with Windows Server 2016 and its
12%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
is on a section of road at any given time. Energy suppliers are involved in performance tuning by electronically monitoring the power consumption behavior of households and industrial enterprises (smart metering
12%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
for publication on the internet. Different subsections and wizards help you with the setup. You can also monitor internal applications and database operations using the web interface. This is available
12%
OpenStack: What's new in Grizzly?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Oksana Perkins, Fotolia
be used as a data source for an industrial billing system and as a source for cloud monitoring. One client (or in Ceilometer-speak, "consumer") is BillingStack, which is a separate billing system for Open
12%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
redundant Ethernet switches, LAN separation, firewalls, intrusion detection, and monitoring. Redundant firewalls are located between the Internet and the AirWatch environment. An intrusion detection system
12%
News for Admins
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
 
: Multi-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto
12%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
for the first time, it downloads the available block and reputation lists to the local system, which you can monitor easily in a terminal window. After launching the server, you can access Maltrail in the web
12%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
Specialist and is editor-in-chief of the Thomas Krenn wiki. His work focuses on the fields of hardware monitoring, virtualization, I/O performance, and high availability.

« Previous 1 ... 47 48 49 50 51 52 53 54 55 56 57 58 59 60 ... 92 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice