Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 84 Next »

9%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
. Classic antivirus programs protect your computer by means of bytecode signatures or use heuristics that combine special system calls or file and hardware access. HIDS also monitors user actions, files
9%
SQL Server 2022 and Azure
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
period themselves. In Azure, you can monitor databases in the same way as locally operated databases on SQL Server 2022. All applications that require access to a SQL database can easily use the cloud
9%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
Stack clusters: RabbitMQ and Neutron. In particular, they traded tips on how best to monitor and alleviate load issues. This discussion was driven by the operators themselves within the OpenStack Large Scale SIG
9%
IAM for midmarket companies
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Robert Anasch on Unsplash
, for monitoring and controlling access by highly privileged users (PAM, privileged access management). Smaller companies, on the other hand, often have only technical administration tools, for example, the Quest
9%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
into a deceptive sense of security: Thanks to technologies such as self-monitoring analysis and reporting technology (S.M.A.R.T.) and wear leveling, these data storage devices can predict their demise and usually
9%
Manage logs with logrotate
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
is added to the logfile. If, however, the application is running and the logfile is being updated, you can still use tail to monitor updates to the file in real time with the follow -f option. The command
9%
Infrastructure as Code with Terraform
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sebastian Duda, 123RF.com
VMs with VMware and OpenStack in your data center, as well as with Amazon and Oracle cloud providers, extending all the way to adjustments of the DNS or monitoring server. For this purpose, Terraform
9%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
the performance values of the current deployment and extract monitoring information. The web interface always runs on the management VM, which admins will most likely prefer to the Cloudify shell because it works
9%
Making Small Business Server 2011 fit for 2014
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © diego cervo, 123RF.com
of these tools provides a monitoring function in the right panel that shows you any problems with the server. Managing Updates Before installing larger service packs on the server, check the settings
9%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
.255.255.0' Rex can also report details about hypervisors, and it can create, configure, start, stop, and destroy virtual machines with VirtualBox, KVM, and Xen. You can even use Rex to monitor a system running

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice