As a longtime user of Chromebooks, I know how useful and convenient those devices can be. They're light, the hardware is solid, and Chromebooks are excellent devices to carry while traveling or working on the go.
The main drawback of Chromebooks, though, is how tightly they're tied to Google's services. Over the last little while, I've been steadily de-Googlizing my life. One of the last big obstacles to doing that has been my Chromebook.
Artila’s “RIO-2010BM” remote digital I/O device runs FreeRTOS on a Cortex-M3, offers isolated inputs, and supports IBM’s Bluemix and Watson IoT platforms.
Like Artila Electronics’ RIO-2015PG, the RIO-2010BM is a remote I/O module that runs FreeRTOS on an MCU, and offers isolated digital I/O. The device is designed specifically for transmitting Modbus/TCP remote data to the IBM Bluemix service and IBM’s Watson IoT cloud-based analytics platform.
For those curious what's been happening with Jolla/Sailfish, the company put out a recap of their announcements and activities at the recent Mobile World Congress event.
It's been a while since any major developments have come out of Jolla, but they have continued investing in the Linux-based Sailfish OS and focusing their commercial work around licensing it to hardware partners rather than trying to bring more devices to market on their own.
There seems to be no shortage of Linux distributions specifically designed and built for security researchers. That list includes the Parrot Security OS Linux distribution, which was updated to version 3.5 on March 8. The Parrot Security OS platform is based on the Debian Linux distribution, with the open-source MATE desktop the default choice for new users. As a platform for security researchers, Parrot Security OS provides a wide array of tools that fit into different categories, including information gathering, vulnerability analysis, database assessment, exploitation tools, password attacks, wireless testing, digital forensics, reverse engineering and reporting tools. One of its more interesting tools is the open-source Kayak car hacking tool that can be used to diagnose a car's CAN (Controller Area Network) bus. In addition, version 3.5 includes the CryptKeeper encrypted folder manager tool, as well as the Metasploit penetration testing framework, which is packed full with 1,627 exploits. For users who want to stay somewhat anonymous while using the system, anonymous web surfing tools are also included in the Linux distribution. In this slide show, eWEEK takes a look at some of the highlights of the Parrot Security OS 3.5 release.