If you own an ICOM D-STAR radio, you know how hard it is to program through the faceplate. And if you are a Linux user, you know that your options are either use the faceplate or borrow a Windows machine (or fire up a VM) and plunk down $60 for the software and cable to program them with. Until now that is. Enter CHIRP. more>>
I had the opportunity to test drive a friend's Asus (Google) Nexus 7, the latest entry into the tablet space. It has an attractive price point, a clear display and most of the tools that you would expect from a tablet. But despite this, there are some serious limitations that might have you think twice about adopting this device as your go to tablet. more>>
Two years ago, I got into a conversation with another professional about the desktop. I opined that very shortly, the desktop would be our cell phone and there would be no need to put file servers at everyone's desk. more>>
I used to have a paperweight sitting on my desk that read something like “Robert H. Lane, appointed President of Commodore Computers....” It was the sort of thing that they gave to executives. A brass plaque of their appointment as it appeared in the Wall Street Journal or the Globe and Mail. more>>
If you work with Open Source software every day, you probably do not think for a moment about license compliance. In fact, if you are not an IT manager or professional intellectual property lawyer, you might not even think about it at all. Until you get the phone call. more>>
One of the standards that has become normal in the US federal sector is the requirement that all mobile devices, such as laptops, have encrypted drives. This was a direct result of a number of laptop thefts earlier in the decade that resulted in the supposed leaking of personal information. more>>
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.