The Coraid folks have released a free-standing tower version of their EtherDrive Storage Appliance, christened the SR1521T. The SR1521T, with internal RAID, provides true networked storage over standard Ethernet and is based on the open ATA over Ethernet (AoE) protocol. Coraid says that “AoE is a block level storage protocol that is simpler to implement than other SAN technologies and at considerably less cost than iSCSI and Fibre Channel solutions.” Further, because AoE is non-routed, “the need for TCP/IP processing overhead or expensive network adapters” is eliminated. The target customers are those that do not seek a rackmounted solution and “that need powerful and scalable network storage readily available at the departmental level”. The AoE protocol is native in the Linux 2.6 kernel, and software drivers are available for Mac OS X, Windows, Solaris and FreeBSD.
Arcosoft joins the growing list of companies that have come to their senses: it just released a Linux version of its VONaLink TeamRecord VoIP-based call-recording application. TeamRecord works with any VoIP phone system based on the SIP standard (think Asterisk), centrally recording all phone calls for a company's workgroup. VONaLink says that TeamRecord, for instance, allows “business transactions over the phone to be verified and disputes resolved” or comply with Sarbanes-Oxley or other disclosure provisions. Furthermore, TeamRecord replaces both expensive analog recording equipment and proprietary products from the dreaded phone company. The recording process involves unobtrusive monitoring of network packets via the port mirroring capability of a network switch and results in an inaudibly watermarked MP3 or WAV file. Users can listen to recordings of their own calls from a Web browser. TeamRecord is available for x86 Linux and Windows platforms.
When not spending time in Amsterdam's offbeat cafï¿½, the members of Dyne.org are busy developing dyne:bolic, upgraded to version 2.4, a live-or-installed Linux distribution focused on the needs of media-production fanatics. The main advantages of dyne:bolic include recognition of a wide variety of devices and peripherals, numerous tools for recording, editing, encoding and streaming audio and video, and the ability to run on lower-powered hardware. New in version 2.4 are improved user-friendliness via the Xfce-4.4 desktop, encrypted nests for preventing access to personal data stored in home directories, new (QParted) and updated (Cinelerra) software and a modularization of the inclusion of different kernels. You also can run (the previous edition of) dyne:bolic on “modded Xbox game consoles” and even cluster them! Raw ISO CD images can be downloaded for free or purchased for a minimal cost.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide