Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 84 Next »

9%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
of I/O, but it is also useful to look further down the stack to see how the I/O requests appear at the various layers. One layer that is useful to monitor is the block layer, which is near the bottom
9%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
a maximum of 1,500W (20A circuit), and you could plug it into a standard 120V outlet. It had an additional graphics card, so you could plug in a monitor. This system sold for $69,000. The DGX Station has now
9%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
comfortably alongside sSMTP. Clearly, the outbound MTA needs to fulfill its obligations for the mail utility and sSMTP to function correctly; if you don't monitor your outbound mail servers, then you probably
9%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
for deploying and managing applications in the OpenShift environment. The RHC toolset includes dozens of simple commands for guiding and monitoring your OpenShift presence. Table 1 shows a sample of some
9%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
? Does the organization have appropriate measures to ensure that continuous monitoring of the network is maintained to identify any potential security breaches? Does a current and comprehensive
9%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
into your continuous integration/continuous delivery (CI/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt’s scripts come in the form of “attack files
9%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [6]; each plain text file ends with the .attack extension. Listing
9%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
-compatible runtime Storage Image Networking Container monitoring All have their own GitHub repositories [4]. The CRI-O site has more information on these repositories, as well. To keep CRI-O minimal
9%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
infrastructure. Many organizations use Kafka to monitor operating data. Kafka collects statistics from distributed applications to create centralized feeds with real-time metrics. Kafka also serves as a central
9%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
and started scanning around on the training cloud at Hetzner with a slightly off netmask. Within minutes, the monitoring tools identified this undesirable behavior and simply shut down the training network

« Previous 1 ... 61 62 63 64 65 66 67 68 69 70 71 72 73 74 ... 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice