{"id":2173,"date":"2009-09-12T14:00:16","date_gmt":"2009-09-12T19:00:16","guid":{"rendered":"http:\/\/dougmcclure.net\/blog\/2009\/09\/interesting-links-for-september-11th-4\/"},"modified":"2009-09-12T14:00:16","modified_gmt":"2009-09-12T19:00:16","slug":"interesting-links-for-september-11th-4","status":"publish","type":"post","link":"https:\/\/dougmcclure.net\/blog\/2009\/09\/interesting-links-for-september-11th-4\/","title":{"rendered":"Interesting Links for September 11th"},"content":{"rendered":"<p>Links that I have found interesting for September 11th:<\/p>\n<ul>\n<li><a href=\"http:\/\/news.thomasnet.com\/fullstory\/565484\">IT Management Software enables corporate-wide SLA and OLA., FireScope, Inc.<\/a> &#8211; One of the most prominent additions to version 3.5 is the redesigned message queue architecture for multi-appliance communication. In other words, reliability. Picture this &#8212; multiple offices feed their monitoring\/management data to a central headquarters. If one of these offices loses connection, the data is completely thrown off and the &#39;big picture&#39; becomes unclear. Worst of all, in many cases this loss of contact goes unnoticed. With FireScope, this situation is only a notification rather than a problem. Unlike competitors, which often lose data during a connectivity interruption, FireScope stores and then backfills the data. Virtually nothing is lost and all reporting and information stay accurate and up-to-date. Now that all the event data is in one place, corporate-wide SLA and OLA are really possible.<\/li>\n<li><a href=\"http:\/\/www.preemptive.com\/\">Protect, Defend, Measure and Manage Software &#8211; PreEmptive Solutions<\/a> &#8211; Protect- Prevent reverse engineering, piracy, and tampering through obfuscation, watermarking, linking, and compaction.\n<p>Defend- Detect tampering, inject real-time tamper defenses, and automate incident management and response.<\/p>\n<p>Manage- Automate end-of-life behaviors for beta releases, evaluation software, and IT policy enforcement.<\/p>\n<p>Measure- Track stability, adoption, usage patterns, and runtime environments across clients, clouds, servers, and mobile platforms without programming.<\/li>\n<li><a href=\"http:\/\/en.wikipedia.org\/wiki\/Runtime_Intelligence\">Runtime Intelligence<\/a> &#8211; The term &lsquo;&rsquo;Runtime intelligence&rsquo;&rsquo; (RI) refers to technologies, managed services and practices for the collection, integration, analysis, and presentation of application usage levels, patterns and practices. RI is a discipline within both Business Intelligence (BI) and Software Development Lifecycle (SDLC) Management that focuses on precision method-level monitoring within applications and macro-level monitoring across populations of applications, platforms and domains.<\/li>\n<li><a href=\"http:\/\/apps-are-people-too.blogspot.com\/2009\/09\/walter-cronkite-for-cio.html\">Applications Are People Too: Walter Cronkite for CIO!<\/a> &#8211; Runtime Intelligence may be the first solution that addresses application developer demand for near real-time visibility into adoption and usage in the field while simultaneously helping operations automate their IT policies and reconcile application investments with business performance.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Links that I have found interesting for September 11th: IT Management Software enables corporate-wide SLA and OLA., FireScope, Inc. &#8211; One of the most prominent additions to version 3.5 is the redesigned message queue architecture for multi-appliance communication. In other words, reliability. Picture this &#8212; multiple offices feed their monitoring\/management data to a central headquarters. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[989,926,600,604,936,601,603,602],"class_list":{"0":"post-2173","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-general","7":"tag-bsm","8":"tag-business-service-management","9":"tag-delicious","10":"tag-itmanagement","11":"tag-itsm","12":"tag-links","13":"tag-read","14":"tag-review"},"_links":{"self":[{"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/posts\/2173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/comments?post=2173"}],"version-history":[{"count":0,"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/posts\/2173\/revisions"}],"wp:attachment":[{"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/media?parent=2173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/categories?post=2173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dougmcclure.net\/blog\/wp-json\/wp\/v2\/tags?post=2173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}