Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop monitoring ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (629)
  • Article (132)
  • News (73)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 Next »

9%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
or more nodes, you can test for resilience (by simulating a failure) and elasticity (by simply adding more nodes). The simple web console lets you monitor automatic data balancing and processing
9%
Endlessh and tc tarpits slow down attackers
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Yewkeo, 123RF.com
} tc [-force] -batch filename where OBJECT := { qdisc | class | filter | chain | action | monitor | exec } OPTIONS := { -V[ersion] | -s[tatistics] | -d[etails] | -r[aw] | -o[neline] | -j
9%
Shadow admin permissions and your AWS account
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © zelfit, 123rf.com
. AWS CloudTrail logs will help, as well as services like Amazon GuardDuty [8], which is a threat detection system. If you find something suspicious when monitoring the usage of access keys and temporary
9%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
approach makes CFEngine policies idempotent; they can therefore be executed as often as required and always achieve the same results. Permanent monitoring of the local system by the CFEngine agent ensures
9%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
in one of the pipeline tasks. In the menubar at the top of the screen, the Projects menu takes you to a list projects of that Zuul monitors, displaying the hosting platform (GitHhub or Gerrit
9%
Secure access to Kubernetes
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Zachery Blanton, 123RF.com
provides a long list of admission controllers that monitor and control very different things. Without changing the configuration, the controllers listed in the "Admission Controller" box are enabled
9%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
The web application Huginn [1] continuously monitors several user-defined websites and Internet services. On the basis of the information published there, it draws up a summary, which it then mails
9%
Open source mail archiving software compared
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Alexander Dedrin, 123RF.com
, define rules for archiving and retention, manage certificates, and start the integrated backup routine. The feature scope also includes integrated monitoring, which returns data in JMX format. The web GUI
9%
Best practices for KVM on NUMA servers
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Joe Belanger, 123RF.com
virtual machines as regular processes, and to minimize the effect of NUMA on the underlying hardware, the libvirt API [2] and companion tool virsh(1) provide many possibilities to monitor and adjust
9%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
for provisioning and configuring network elements, performance monitoring on the network, and all operational alerts on the network. Applications or IP endpoints need to tag their packets with the CS2 DSCP value up

« Previous 1 ... 75 76 77 78 79 80 81 82 83 84 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice