Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (661)
  • Article (133)
  • News (75)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 88 Next »

9%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
information that is problematic with a view to the European Union General Data Protection Regulation (GDPR) or personnel agreements (monitoring). In large companies, administrators are strongly advised
9%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
components or third-party software and cloud services are a central element of a comprehensive ASM. This process includes risk assessment and the continuous monitoring of new information such as CVEs to enable
9%
TKperf – Customized performance testing for SSDs and HDDs
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Orcea David, 123RF
The Author Georg Schönberger works as a technology specialist at Thomas-Krenn.AG and is a contributor to the Thomas-Krenn wiki. His work focuses on information security through monitoring plugins
9%
Secure email with IceWarp mail server 10
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
merzavka, 123RF
email is more extensive than in Exchange and, above all, more stable. Because IceWarp supports many features and standards, many system services are used that can be monitored and disabled separately
9%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
script for the class-based QoS (class-based queuing, CBQ). /sbin/ifcfg – Replaces the IP address management option in ifconfig. /sbin/rtmon – Enables monitoring of the routing table. /sbin
9%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
9%
New Features in PowerCLI 6.0 R3
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Rgbspace, Fotolia.com
with Disconnect OMServer. If you only want to interrupt a session and resume it later on, you can read the Session Secret and then re-connect with it. Within the session, you have access to a variety of monitoring
9%
Features of PowerShell loops
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © bowie15, 123RF.com
work, such as creating users, monitoring processes, or installing software. Any programming or scripting language needs instructions the user can employ to design loops. It is irrelevant whether
9%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
tasks for administrators because they only need to keep the server in mind, making it much easier to monitor the environment. In principle, ThinLinc supports all Linux distributions that use the RPM
9%
Optimizing domain controller security
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Nathan Roser on Unsplash
controllers are already suffering capacity problems. In this case, extended system monitoring can cause the DCs to respond more slowly, but if you are at this point, replacing the hardware is the order

« Previous 1 ... 62 63 64 65 66 67 68 69 70 71 72 73 74 75 ... 88 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice