At Rectiphy, innovation goes beyond the spelling of the company name to include its new technology—that is, the company's ActiveImage Protector Linux Edition. The product is a disk-imaging backup technology for Linux environments that incorporates Rectiphy's Smart Sector snapshot technology, which the company says speeds up backups and reduces disk storage space in Ext2/Ext3/Ext4 formats. Support for the Linux-native snapshot driver enables users to create a full backup of the Linux server HD or volume without shutting down the OS. Bare-metal recovery is supported, as well as retrieval of individual files from the backup image.
Few things will burnish your hard-core technorati credentials like learning the classic document markup language LaTeX and its typesetting companion program TeX. The tools are used for creating scientific and technical documents. Get up to speed fast with Stefan Kottwitz's LaTeX Beginner's Guide, a new book that helps new users overcome LaTeX's relatively steep learning curve and leverage its powerful features. Readers learn to typeset documents containing tables, figures, formulas and common book elements like bibliographies, glossaries and indexes. Additional topics include management of complex documents and the latest fonts and PDF-related features. A great deal of the book is dedicated to one of LaTeX's most powerful features: the designing of complex math formulas and other expressions.
Syngress describes Cory Altheide and Harlan Carvey's new book Digital Forensics with Open Source Tools as “digital forensics, MacGyver style.” Unfortunately for the 1980s TV hero MacGyver, his toolset predated open source. But thanks to Altheide and Carvey, you have all the open-source forensics tools at your disposal for investigating Linux, Mac and Windows systems, complete with guidance. Topics include the open-source examination platform, disk and filesystem analysis, system-specific issues and artifacts, Internet-related artifacts, file analysis, automating analysis and more. The appendix goes into detail on particularly useful open-source tools.
The team at Xelltec categorizes it new Xelltec Integrated Security System (XISSYS) as “revolutionary” because it enables users “to remotely track and protect their laptops and handheld devices”. The patent-pending XISSYS microchip is an embedded security solution designed to allow users to disable or find a stolen laptop, smartphone, or other mobile device easily. This prevents thieves from gaining access to sensitive data. The microchip can wipe out data, or it can destroy the mobile device physically with a high-frequency voltage so that it is completely inoperable. Furthermore, if the user needs the data that is on the mobile device, it can be copied remotely from the device to a server before the data is destroyed. The microchip also acts as a tracking device, enabling the owner to find the physical location of the stolen device. Xelltec is seeking strategic alliances with popular main board and computer manufacturing companies worldwide.
If you deploy the new Napatech Software Suite for your network appliance development, the company says you'll need to develop its application software only once and then simply decide which network adapter combination works best in the particular deployment. Besides this flexibility, the suite offers critical functionality that can accelerate performance of network appliances. Both a hardware abstraction and streamlined API are provided, allowing network appliance vendors to take advantage of Napatech's full range of intelligent network adapters quickly and easily. Hardware abstraction allows multiple intelligent network adapters of different types to be combined on a plug-and-play basis in a standard server platform. The same feature set can be offered independent of the port speed. A number of open-source software applications, such as Suricata, Snort and Ostinato are supported.
James Gray is Products Editor for Linux Journal.
|Contrast Security's Contrast Enterprise||Aug 30, 2016|
|illusive networks' Deceptions Everywhere||Aug 29, 2016|
|Happy Birthday Linux||Aug 25, 2016|
|ContainerCon Vendors Offer Flexible Solutions for Managing All Your New Micro-VMs||Aug 24, 2016|
|Updates from LinuxCon and ContainerCon, Toronto, August 2016||Aug 23, 2016|
|NVMe over Fabrics Support Coming to the Linux 4.8 Kernel||Aug 22, 2016|
- Contrast Security's Contrast Enterprise
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- illusive networks' Deceptions Everywhere
- Happy Birthday Linux
- What I Wish I’d Known When I Was an Embedded Linux Newbie
- New Version of GParted
- ContainerCon Vendors Offer Flexible Solutions for Managing All Your New Micro-VMs
- Tech Tip: Really Simple HTTP Server with Python
- All about printf
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide