If we're talking new products, we must have a virtualization item in there somewhere. XenSource is announcing the release of XenOptimizer in beta form, with the product to follow in early 2006. It is also releasing the 3.0 version of the underlying Xen technology. According to XenSource, XenOptimizer offers production-grade capabilities, superior performance and lowers the total cost of ownership for a data center. Administrators can provision virtual servers using a simple drag-and-drop GUI dashboard. This has been your moment of Xen.
Stratus Technologies has announced that its über-reliable ftServer T60 will be the first piece of Stratus hardware to support Linux, specifically Red Hat Enterprise Linux. This will add, for the first time, a Linux distribution to the Stratus product offerings, which already include Windows and the proprietary Stratus VOS operating system.
The heart of any embedded Linux application is usually a CompactFlash (CF) card. Unfortunately, not all of them live in 72°F living rooms. WinSystems has released a series of CF cards designed to work from a bone-chilling –40°C to a blazing 85°C. These cards, available in sizes ranging from 128MB up to 2GB, are engineered for reliable performance and long lifetimes, without sacrificing speed.
Your open-source PBX just got an IQ upgrade. Digium has released the first major revision of the open-source Asterisk PBX Project since September 2004. Asterisk 1.2 includes more than 3,000 new or improved features, such as improved voice mail, SIP protocol support and the use of sound files for music on hold.
Get out your SQL queries and spiff up your inserts. The PostgreSQL Global Development Group has released PostgreSQL 8.1. In addition to the usual performance improvements and bug fixes, the 8.1 release adds roles, which allow database rights to be assigned to entire groups rather than to individuals, and the ever-popular two-phase commit (which, as we all know, “allows ACID-compliant transactions across widely separated servers”).
Just because you're trying to package your embedded Linux application onto one of those tiny PC/104 cards doesn't mean you can't have cranking video performance. With only 8MB of RAM, you won't be using VersaLogic Corp.'s EPM-VID-3 to play Silent Hill, but the ATI Rage Mobility M1-based add-on card is just the thing for applications that require up to three heads running at up to 1600x1200 at 24 bits. With built-in hardware MPEG decoding, it'll let you stream your video without taxing those underpowered embedded processors.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide