Products

PasswordPing Ltd.'s Exposed Password and Credentials API Service

The typical online user has an average of 90 active and inactive online accounts. This exposure to threats, notes software and IT security specialist PasswordPing Ltd., helps to inform us why billions of credentials have been exposed in the past five years alone. To assist organizations and companies to screen their user accounts for known, compromised credentials, PasswordPing Ltd. more>>

openHAB

Partners Canonical, openHAB Foundation and Azul Systems have collaborated hard to drive development of the new openHAB 2.0 smart-home platform as a snap package. An alternative to Apple Homekit and Samsung SmartThings, openHAB from openHAB Foundation is completely free and open source, and acts as a control hub for home IoT setups. more>>

CodeLathe's Tonido Personal Cloud

CodeLathe counts Dropbox and OneDrive as competitors to its Tonido Personal Cloud storage service. While the former can cost anywhere from $50 and up per year to store a TB of data, CodeLathe's cross-platform Tonido for the desktop is fully free, and storage space is limited only by users' hard drive capacities. more>>

MultiTaction's MT Canvus-Connect

"A new era in visual collaboration" is the promise of MT Canvus-Connect, MultiTaction's new real-time collaboration software that enables visual touchscreen collaboration across remote locations in real time. more>>

Mender

The new production release of Mender 1.0, an open-source tool for updating embedded devices safely and reliably, is now available. more>>

VMKings' VPS Hosting Solution

The management team of cloud provider VMKing, as developers themselves, found standard virtual servers not to be well tailored to the developer community—too much or too little space, insufficient security and no support for their preferred Linux OS(!). more>>

Briggs and Stratton 8,000 Watt Elite Series Portable Generator with StatStation Wireless

Although Linux Journal readers might not equate Milwaukee with tech, a new Briggs & Stratton product portends the bright future of smartened "legacy" devices from the industrial heartland. more>>

SUSE Linux Enterprise High Availability Extension

Historically, data replication has been available only piecemeal through proprietary vendors. In a quest to remediate history, SUSE and partner LINBIT announced a solution that promises to change the economics of data replication. more>>

HOSTING Monitoring Insights

An important need for today's CIOs is gaining greater granular visibility into hybrid cloud and on-premises environments to maximize the business value of their IT assets. more>>

William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)

Watch William Rothwell and Nick Garner's new Certified Ethical Hacker (CEH) Complete Video Course and learn everything you need to know to ace the CEH exam in less than 11 hours. more>>

William Gurstelle's ReMaking History, Volume 3 (Maker Media, Inc.)

In William Gurstelle's ReMaking History series from Maker Media, Inc., readers get exponentially closer to the inventors who shaped our modern world compared to other histories of technology. more>>

Minifree Ltd.'s GNU+Linux Computers

Minifree Ltd.—doing business as "Ministry of Freedom"—exists mainly for reasons Linuxers will like: to make it easier for people to get computers that respect their freedom and privacy, and to provide funding for a meaningful project, called Libreboot. more>>

NETGEAR, Inc.'s GSS108EPP and GS408EPP Switches

Two new NETGEAR, Inc., Power-Over-Ethernet (PoE) switches feature a novel "Virtually Anywhere" mounting system that delivers modern high-power PoE+ to devices that others cannot. more>>

TRENDnet's WiFi Everywhere Powerline 1200 AV2 Access Point, Model TPL-430AP

TRENDnet recently released an innovative new solution that creates dead-spot-free home Wi-Fi by leveraging a home's existing electrical system. more>>

SSH Communications Security's Universal SSH Key Manager

Today's IAM solutions, warns enterprise cybersecurity expert SSH Communications Security, fail to address fully the requirements of trusted access. Organizations lack an efficient way to manage and govern trusted access credentials and have no visibility into the activities that occur within the secure channels that are created for trusted access operations. more>>

Syndicate content