As if gamers didn't need another fix, CodeWeavers recently released Linux and Mac versions of CrossOver Games 8.1, an emulator that allows one to play Windows-based games without a Windows license. The new version 8.1, code-named Zombie Mallard, adds support for the fervently anticipated new game Left4Dead 2 to the existing roster of games, which includes World of Warcraft, EVE Online, Guild Wars, Prey and the Half-Life series. CodeWeavers says that it is pleased to enable its customers to “do their bit to stave off the effects of the apocalyptic zombie plague sweeping this nation”. CrossOver Games is available for download, either directly or via its authorized resellers.
Gene Sally's new book Pro Linux Embedded Systems (Apress) goes beyond just porting embedded Linux to new hardware to cover tuning Linux and leveraging open-source code to build more robust, feature-rich embedded applications. The guide is a resource for employing technologies and techniques typically reserved for desktop systems. Readers will learn the anatomy of an embedded Linux project as well as how to create an embedded Linux development environment, configure and build an embedded Linux kernel, configure and build open-source projects for embedded systems and minimize resources and boot times. In addition, the book explores open-source resources available to improve development.
If you're looking for a comprehensive resource on artificial intelligence, pick up the new third edition of Peter Norvig and Stuart Russell's book Artificial Intelligence: A Modern Approach. Targeted at computer professionals, linguists and cognitive scientists interested in artificial intelligence, this work is an exhaustive treatment of the theory and implementations of AI. Key topics include intelligent agents, solving problems by searching, informed search methods, game playing, agents that reason logically, first-order logic, building a knowledge base, inference in first-order logic, logical reasoning systems, practical planning, planning and acting, uncertainty, probabilistic reasoning systems, decision making, learning from observations, learning with neural networks, agents that communicate, perception, robotics and more.
RunRev Ltd. has boosted the feature set of its new Revolution 4.0 for application and Web development, available for the first time in a free version. RunRev says that Revolution offers “dramatic time and resource savings over traditional tools such as Flash, Silverlight, Java and C++”. The new version 4.0 also offers direct deployment to the Web without recoding or writing a line of HTML. Revolution is a modern descendant of natural-language technologies, such as Apple's HyperCard, which enables software construction to nonprogrammers. Revolution 4.0 has three editions for different skill levels: the free revMedia, the enhanced revStudio and the revEnterprise for mission-critical applications.
Coyote Point has bulked up the feature set of its EQ/OS Version 8.6, the latest iteration of the traffic management operating system that drives its Equalizer GX series product line. The series ranges from the entry-level E250GX load balancer to the enterprise-class E650GX all-in-one application delivery appliance. Core enhancements include 802.1Q VLAN support, which can double aggregate network throughput (up to 2.6 Gbps for the E650GX); overhaul of the failover subsystem; cluster-cloning capability; an expanded toolset for intelligent load balancing of VMware Infrastructure and a new energy-efficiency capability to power servers on and off automatically.
James Gray is Products Editor for Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide