Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 84 Next »

9%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
-based QoS (class-based queuing, CBQ). * /sbin/ifcfg – Replaces the IP address management option in ifconfig. * /sbin/rtmon – Enables monitoring of the routing table. * /sbin/tc – Used to configure
9%
Zero-Management Databases
02.10.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
the cash or time to manage your own MySQL servers, this service can get you a long way. Autoscaling is available in all supported providers. You can set monitoring and scaling thresholds based on CPU
9%
The New Hadoop
17.07.2013
Home »  HPC  »  Articles  » 
Manager is the per-machine framework agent that is responsible for Containers, monitoring their resource usage (CPU, memory, disk, network), and reporting back to the ResourceManager. Figure 3 shows the various
9%
Hardware-assisted Virtualization
29.08.2011
Home »  Articles  » 
to support system virtualization in their article, "Formal Requirements for Virtualizable Third Generation Architectures." This landmark paper defined three properties for a virtual machine monitor (VMM
9%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
, but also provides function-level call path information, giving the calling context and events along call paths in the application being monitored. hwcsamp (osshwcsamp ), which uses a timer-based sampling
9%
Netcat – The Admin’s Best Friend
20.08.2012
Home »  Articles  » 
 
tool, a whitehat security tool, and a server or a client; it performs monitoring, supports tunnelling, and is a simple TCP proxy server on top of all that! Hard to believe, I realize, but in this article
9%
PowerTOP
21.10.2011
Home »  Articles  » 
 
up the processor, thus adding to your electricity bill. Detective Work The PowerTOP tool identifies just these types of processes on Linux systems. It monitors all the active processes and device
9%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
the conference, uses quite a bit of power. I don’t know how SCinet started, but it demonstrates what it takes to build the most powerful and advanced network anywhere, including power and cooling, monitoring
9%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
the developers, a role model already exists for a network in which the two endpoints can communicate anonymously with one another without being monitored: Tor. The makers of DIME, led by Levison, described DIME
9%
Just-in-time administration in Active Directory
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Orlando Rosu, 123RF.com
an account is a direct or indirect member, as with any role-based access control (RBAC). If the number is too high, the user token inflates, which many applications cannot handle. Processes such as monitoring

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice