BOXX Technologies announced a new line of 3-D rendering workstations based on dual Opteron processors; machines built on the 240, 242 and 244 processors are now available. M4 workstations use NVIDIA Quadro architecture for modeling and rendering 3-D content and animation with Maya, 3ds max, SOFTIMAGE XSI, LightWave 3D and Houdini. The standard workstation includes the AMD-8111 HyperTransport PCI tunnel, the AMD-8151 HyperTransport AGP tunnel, 128-bit dual-channel memory bus, up to 8GB ECC registered 333MHz DDR, four DIMM slots, dual channel UltraDMA 133 IDE controller and six channel audio. Custom-configured workstations also are available. The workstations have lightweight aluminum chassis for heat dissipation, and two 92mm fans provide airflow.
BOXX Technologies, Inc., 10435 South Burnet Road, Suite 120, Austin, Texas 78758, 877-877-2699, www.boxxtech.com.
The first products in Interphase's new network security product line are the 45NS (PMC) and 55NS (PCI) network security acceleration adapters. Designed to eliminate traffic bottlenecks caused by VPNs, gateways, routers and firewalls, the accelerators off-load bandwidth-intensive IPSec processing from the host CPU. The accelerators handle header analysis, payload exraction, compression, encryption, authentication and packet assembly. Both adapters offer 500Mbps 3DES throughput and accelerate DES, MD5, SHA-1, RC4 and AES security algorithms. They also offer a 64-bit 66MHz PCI bus, 64MB of private memory and support for full duplex OC-3 rates and 512K simultaneous sessions.
Interphase, Parkway Centre, Phase 1, 2901 North Dallas Parkway, Suite 200, Plano, Texas 75093, 800-327-8638, www.interphase.com.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide