Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 83 Next »

9%
The Benefit of Hybrid Drives
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Vaclav Volrab, 123RF.com
. This relationship can be illustrated in another way: For example, the time command, if called with the -v parameter or the format string %f, outputs a statistic that shows how often an application that it monitors
9%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
is an automation system, such as Chef [6] or Puppet [7]. Monitoring software also ensures that admins discover errors at an early stage and can take preventive action before major failures occur. Metrics Dev
9%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
for transmitting sensor measurement data, augmented reality for plant maintenance and to provide guidance for repairs, and drones for monitoring the site or checking emission levels. Because 5G also minimizes wiring
9%
Manage updates and configuration with Azure Automation
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © bagwold, 123RF.com
on the monitored system. If important updates are missing, the status will be Non-compliant . This example uses Windows Update as the approval source and the Automatic Updates setting is for scheduled
9%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
, managed detection and response (MDR), and security operations centers as a service (SOCaaS). MDR describes an approach in which XDR environments and other systems are monitored by an external vendor who
9%
Test your system to help fight phishing attacks
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by David Clode on Unsplash
the Complete command in the results overview. The current Gophish version does not support automatic termination of campaigns. Receiving Reports by Email If you have carefully monitored the console output
9%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
. Classic antivirus programs protect your computer by means of bytecode signatures or use heuristics that combine special system calls or file and hardware access. HIDS also monitors user actions, files
9%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
period themselves. In Azure, you can monitor databases in the same way as locally operated databases on SQL Server 2022. All applications that require access to a SQL database can easily use the cloud
9%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
Stack clusters: RabbitMQ and Neutron. In particular, they traded tips on how best to monitor and alleviate load issues. This discussion was driven by the operators themselves within the OpenStack Large Scale SIG
9%
IAM for midmarket companies
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Robert Anasch on Unsplash
, for monitoring and controlling access by highly privileged users (PAM, privileged access management). Smaller companies, on the other hand, often have only technical administration tools, for example, the Quest

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice