Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (624)
  • Article (131)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 83 Next »

9%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
parameter set, I can monitor the action. If no problems occur, the output will look like Figure 2. The classes used are shown, along with their methods, and no errors were reported. However, I still don
9%
Dos and don'ts of backing up Kubernetes storage
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Alexander Bedrin, 123rf.com
containers do not use a complete operating system image with an init system nor their own filesystem tools to run services in the background and monitor file changes. If users were to convert their containers
9%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
information that is problematic with a view to the European Union General Data Protection Regulation (GDPR) or personnel agreements (monitoring). In large companies, administrators are strongly advised
9%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
components or third-party software and cloud services are a central element of a comprehensive ASM. This process includes risk assessment and the continuous monitoring of new information such as CVEs to enable
9%
TKperf – Customized performance testing for SSDs and HDDs
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Orcea David, 123RF
The Author Georg Schönberger works as a technology specialist at Thomas-Krenn.AG and is a contributor to the Thomas-Krenn wiki. His work focuses on information security through monitoring plugins
9%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
email is more extensive than in Exchange and, above all, more stable. Because IceWarp supports many features and standards, many system services are used that can be monitored and disabled separately
9%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
script for the class-based QoS (class-based queuing, CBQ). /sbin/ifcfg – Replaces the IP address management option in ifconfig. /sbin/rtmon – Enables monitoring of the routing table. /sbin
9%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
9%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
with Disconnect OMServer. If you only want to interrupt a session and resume it later on, you can read the Session Secret and then re-connect with it. Within the session, you have access to a variety of monitoring
9%
Features of PowerShell loops
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © bowie15, 123RF.com
work, such as creating users, monitoring processes, or installing software. Any programming or scripting language needs instructions the user can employ to design loops. It is irrelevant whether

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice