In any discipline, the road to true mastery and wisdom requires a comprehensive view. If programming is the discipline in which you seek such mastery, crack open Bruce A. Tate's new book Seven Languages in Seven Weeks, A Pragmatic Guide to Learning Programming Languages. The book has what publisher Pragmatic Bookshelf calls an “audacious goal”, which is to present a meaningful exploration of seven languages—namely Clojure, Haskell, Io, Prolog, Scala, Erlang and Ruby—within a single book. Seven Languages covers what's essential and unique about each language and the most critical programming models of our time. For each language, readers solve a nontrivial problem, using techniques that show off the language's most important features, strengths and weaknesses.
Jothy Rosenberg and Arthur Mateos' penned the new book The Cloud at Your Service because the market needed a book on cloud computing targeted at corporate decision-makers. The book, which is subtitled “The when, how, and why of enterprise cloud computing”, seeks to inform managers, buyers, enterprise architects, CIOs and CEOs on the what, when and how of moving to the cloud. It is the book the authors wished they had when they were in that role. Cloud-computing-related topics include an introduction, the business case, private clouds, designing and architecting for scale and reliability, practical considerations, deployment and operations and a look into the future of cloud computing.
STM, specialists in the toting of precious gear, has released its new Revolution Laptop Backpack line for organized and protected transport of laptops. Each of today's critical elements in the digital lifestyle gets its own space, including a concealed, plush-lined section for the laptop, an integrated pocket for the iPad, a main component for books and paperwork, two versatile side pockets, and an organizational panel for cords, drives, pens and so on. Comfort features include an adjustable suspension system, sternum strap and tuck-away waist straps. There's also a tuck-away rain cover for unexpected downpours. The Revolution is available in two sizes and two colors.
Symantec recently released two new solutions for VMware environments—that is, ApplicationHA and VirtualStore, which the company says “will enable organizations to virtualize their mission-critical applications and minimize their storage costs on the VMware platform.” Symantec ApplicationHA, which is based on Veritas Cluster Server technology, provides high availability for business-critical applications through application-level visibility and control in VMware environments. Meanwhile, the Symantec VirtualStore, based on Veritas Storage Foundation technology, is a software-based storage management solution for VMware virtual machines that provides rapid provisioning of servers and virtual desktops, efficient cloning and accelerated bootup of virtual machines. Both ApplicationHA and VirtualStore are integrated seamlessly with VMware management tools, such as VMware vCenter Server, enabling customers to deploy these tools without impact to their operational models.
NoMachine calls its long-awaited NoMachine NX 4.0 software release “the biggest since the day the company was founded” and promises to take “remote access and desktop and application delivery software to an unprecedented level for both physical and virtualized computing environments.” New functionality includes secure remote access to Windows and Mac desktops and applications; browser-based access to NX sessions from anywhere; access from smartphones, video support, recording and playback of NX sessions; USB forwarding to remote devices; a new client GUI and more. Version 4.0 will be guaranteed to all subscribed customers, and a basic free version for personal use is available for download.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Server Hardening
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- The US Government and Open-Source Software
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide