The data-logger expert Onset has expanded the capabilities to its HOBO U12 line, which now can measure and record kilowatts, air velocity, gauge pressure, differential pressure, DC current and other energy and environmental parameters. Onset attributes this new functionality to a new, compact power adapter, which enables energy and building management professionals to power external sensors that require 12-volt A/C excitation power conveniently. The new functionality augments existing measurement parameters, such as air temperature, relative humidity, light intensity, AC current and AC voltage. HOBO U12 Data Loggers also can record data unattended for up to months at a time, storing up to 43,000 measurements. Using a USB connection, HOBO U12 data loggers offer convenient, high-speed data offload directly to a computer or to a HOBO U-Shuttle data transport device.
The authorial threesome Dave Gray, Sunni Brown and James Macanufo have just released an interesting new book, Gamestorming: A Playbook for Innovators, Rule-Breakers, and Changemakers. The subtitle indicates that the book is targeted squarely at us—that is, “people who want to design the future, to change the world, to make, break and innovate.” The book's premise is that 200 years of industrial habits are embedded in our workplaces, our schools and our system of government, and certain strategies are required to make the changes necessary to “win in the 21st Century”. Gamestorming is full of practical solutions that help one engage people in a project, to get better traction and move more quickly with groups, to make things happen and get better, faster decisions and results.
No Starch Press, publisher of Michael Kerrisk's 1,500-page book The Linux Programming Interface, bills the title as the “authoritative work” and “definitive guide to the Linux and UNIX programming interface”. Kerrisk, who is the maintainer of the Linux man pages project, presents detailed descriptions of the system calls and library functions that one needs in order to master the craft of system programming. He accompanies his explanations with clear, complete example programs. Some key topics include using signals, clocks and timers; creating processes and executing programs; writing multithreaded programs using POSIX threads; building and using shared libraries; performing interprocess communication using pipes, message queues, shared memory and semaphores; and writing network applications with the sockets API.
SugarCRM hopes to (warning of sugar metaphor ahead) sweeten up the CRM space with Sugar 6, the latest edition of the company's flagship CRM system. The buzz around Sugar 6 involves its integration of social-media tools, such as Twitter, Facebook and LinkedIn, directly within the user interface. Users now can listen, monitor and aggregate social data and tie it to their existing customer information in a simple yet highly structured manner.
The recent brewing going on at enStratus has resulted in a new edition of its self-titled suite of tools for managing cloud infrastructure that now includes VMware's vSphere. With this expanded support, customers can leverage a unified solution to manage vSphere as well as private and public cloud infrastructures. Features that customers now can leverage in a vSphere deployment include self-provisioning, advanced user management, financial controls and automation. In addition to supporting vSphere and vCloud Express from VMware, enStratus also supports leading cloud infrastructure platforms from Amazon Web Services, Eucalyptus, GoGrid, Rackspace, Cloud.com, ReliaCloud, Terremark and Windows Azure.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide