Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (100)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

8%
Performance testing monitoring solutions
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Kheng Ho Toh, 123RF.com
time is measured from the point at which it is called by the core up to the time it returns the return code. In the worst possible case, executing a plugin will cause a timeout because the component you ... 7
8%
Monitoring IoT devices
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © alexutemov, 123rf.com
] and Azure Monitor [3] services monitor the IoT data stream via the alert path. Azure Monitor also offers additional features for analysis, visualization, and automatic actions, which I will not be discussing
8%
News
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
 
customers to block any IP address that is behaving in an abusive way. Akamai Kona Site Defender will be generally available April 11, 2012. For more information, visit http://www.akamai.com
8%
Comparing system rescue distros
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Kirill Makarov, 123RF.com
Knoppix website. However, another reason explains why the relevance of Knoppix and, more fundamentally, rescue systems has dwindled. Where data center administrators used to turn to Knoppix to help a system
8%
Remote Access with Tactical RMM
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Marten Newhall on Unsplash
administrators likely think instinctively of tools that monitor servers in the data center (e.g., Nagios or Prometheus). However, that's not what RMM is about; instead, it focuses on an organization's clients
8%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
and manage flows between environments by DevOps pipelines without granting users direct access to the production environment; flows that process large volumes of data or start frequently, generating many
8%
Building more efficient database applications with a graph database
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Jakub Krechowicz, 123RF.com
://neo4j.org http://www.sones.de/static-en/ http://www.infogrid.org http://www.hypergraphdb.org http://www.dekorte.com/projects/opensource/vertexdb/ License GPLv3
8%
Tested: Autoconfiguring IPv6 clients
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Benis Arapovic, 123RF.com
with Ethernet addresses), the seventh bit is inverted. In my example, the last 64 bits of the address would create the host part of a block of 64 normally used for a LAN: 02:11:22:FF:FE:33:44:55. The client
8%
Controlling multiple systems simultaneously with Synergy
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
©Kheng Ho Toh, 123RF.com
To operate Synergy, you need at least two PCs, each with its own operating system, monitor, and functional network card. The software supports Windows 95 through Windows 7, Mac OS X as of version 10
8%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
the containers: wget https://raw.githubusercontent.com/alerta/docker-alerta/refs/heads/master/docker-compose.yml sed -i -e 's/ADMIN_PASSWORD=.*/ADMIN_PASSWORD=abc123/' docker-compose.yml docker-compose up -d

« Previous 1 2 3 4 5 6 7 8 9 10 11 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice