JetKVM is much like nanoKVM but a slightly polised version.
What is JetKVM?
JetKVM is a high-performance, open-source KVM over IP (Keyboard, Video, Mouse) solution designed for efficient remote management of computers, servers, and workstations. Whether you’re dealing with boot failures, installing a new operating system, adjusting BIOS settings, or simply taking control of a machine from afar, JetKVM provides the tools to get it done effectively.
As far as I know, these Jets are not available for retail yet, but can be bought via their kickstarter.
Sorry if this question is easily answerable by reading and I’m just missing it. But I genuinely don’t really understand what this product does or what its use case is. Is it a usb stick that gives you kvm access to a computer from a remote location? Like call up someone in another building ‘hey plug the jet into tower X so I can remote in?’ In which case how is this better/worse/just different from a software solution like Barrier? Sorry if I’m being borderline deliberately obtuse but the website gives no info on the home page at all.
Edit: I think I understand better, digging into it more. But if anyone has an ELI5 I would greatly appreciate it.
KVM also allows access if the machine isn't booted up, so like mounting remote recovery images, re-installing an OS, and changing BIOS settings and that kind of thing.
I love this. I have a box I've been wanting to move to a family members place because they have fiber and I don't. They're heavy users of the plex server I have on there, so they're happy to host it, but if I ever had issues around anything boot related I'd be down until I could physically get there.
This would also be awesome for troubleshooting some RasPi stuff where I kind of want the DE every now and then but mostly let it run headless.
@Lemjukes@Sunny It's a KVM that you access over IP. It's physically plugged into a machine's HDMI and USB ports so, unlike software solutions, it can be used to access the BIOS/UEFI and system functions prior to hitting the desktop (like login managers and recovery consoles), and allows you to boot other operating systems and the like. It can also act as a PXE host for loading disk images, issue Wake On LAN to its connected machine, and likely a bunch of other convenience functions.
As for food functionality it is very comparable to software remote control of a computer. There are 3 key features that stand out:
It does not rely on the target machine being booted into the OS. This means you can access it even if it crashes or locks up.
It can "push" the power button on the machine. This requires an accessory that plugs into the motherboard. So you can force a machine off or cold boot a system.
You can mount a boot ISO. This is like having a bootable flash drive in the target machine so you can install an OS remotely.
Edit: Because this is essentially full access to the machine as if you where physically at it, it should be considered a security risk. Not saying that you need to be scared of it, but you should be aware of the risk and protect it from unauthorized access.
It's different (arguably better) than remote connection software because it is a separate device that basically just forwards your keyboard & mouse inputs. This means that you can control the remote device even if it's powered off or not able to boot properly, and you can configure the BIOS remotely too.
You could call someone on-site to connect the KVM to a server, but KVMs, while expensive by regular person standards, are pretty cheap as enterprise hardware goes. So some organizations just keep separate KVMs plugged into all critical hardware all the time.
Worth noting here that KVMs are potentially a quite high security risk.
Their website is probably light on details because "KVM" is fairly common industry parlance. If you normally work with this stuff then just hearing those 3 letters tells you most of what you need to know.
Sure, as long as the VPN itself is secure. Strong passwords/keys, etc. A VPN itself can be a potential security risk, as if it's compromised an attacker can tunnel traffic directly into a network straight past a firewall.
The risks can definitely be mitigated, but if someone's asking for an ELI5 on KVMs, then it may be best to stay away until they have a better understanding of IT infrastructure altogether.
Remote KVM lets you access the machine as if you’re in front of it, including pre-boot / BIOS / BSoD’s / Etc (when software isn’t / can’t run) because the device (usually) connects to the computer’s USB/VGA port.
I have a similar project called PiKVM. I can remotely turn on my computer from a full shutdown, navigate the BIOS to select an OS, and log in, after which I typically switch to a software-based Remote Desktop which is more performant. But you can’t power on a computer and navigate a BIOS with a software solution.
For me, they're also useful because a lot of my jobs don't allow remote software to be installed on laptops, so I use something like this to be able to remote in still.