Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 84 Next »

9%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
commissioning and continuous monitoring in production are essential to ensure that hyperthreading offers the benefits you expect. In contrast, vCPUs are an abstraction that enables a VM to use computing
9%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
, they are not monitored, although this does not apply to the Windows Management Instrumentation (WMI) persistence rule. In the next phase, you will exit audit mode and activate the defined rules. If you identified rules
9%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
table attacks. This technique significantly improves the security of hashed data and should be used by default. Implement continuous monitoring and evaluation processes to ensure the effectiveness
9%
openlava – Hot Resource Manager
10.10.2012
Home »  HPC  »  Articles  » 
an architecture document, here is a quick overview: LIM: The openlava Load Information Manager monitors the machine’s load and sends the information to the LIM on the cluster master. RES: The openlava
9%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
confidential information through analysis of the error messages. Additionally, administrators should log the error conditions and monitor the total number of error messages. If the number of errors increases
9%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
a workflow in relation to the kinds of things you need to do. I want to submit my job, I have some jobs running, and I want to actually monitor them, and I don’t just mean see which ones are running and which
9%
Graphite: Collect and Visualize Numeric Data
30.07.2014
Home »  HPC  »  Articles  » 
claims to “handle approximately 160,000 distinct metrics per minute running on two niagra-2 Sun servers on a very fast SAN” [1]. Graphite is thus best used in environments that need to monitor thousands
9%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
the TEM agent is installed. The agent requires two-way network communications with the TEM server. The upside to TEM is its ability to manage and monitor thousands of endpoints. TEM’s downside is its
9%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
captures packets in libpcap format, it adds a timestamp entry to the record in each packet in the capture file. Monitoring software like tcpdump uses libpcap to capture packets traveling over a network, read
9%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
of a wayward user process, and one way to find that process is to use the commands mentioned in this article. For example, you can use the watch command to monitor the load on the system. If the system

« Previous 1 ... 51 52 53 54 55 56 57 58 59 60 61 62 63 64 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice