background preloader

GroundWork Open Source IT Monitoring and Network Management Software

GroundWork Open Source IT Monitoring and Network Management Software

Hyperion In 2007, Oracle acquired Hyperion, a leading provider of performance management software. The transaction extends Oracle's business intelligence capabilities to offer the most comprehensive system for enterprise performance management. Over the past few years, Oracle has significantly reoriented our business intelligence product strategy, shifting our focus from offering a solution that works for Oracle-only environments towards offering a best-of-breed business intelligence and performance management product family that will work with heterogeneous information sources in an enterprise, both Oracle and non-Oracle. The acquisition of Hyperion extends our business intelligence product strategy. Customers are increasingly using performance management and business intelligence together. After the acquisition, we introduced a new product family called Oracle Business Intelligence Enterprise Edition Plus.

OpenNMS CoffeeSaint CoffeeSaint is a fully customizable Nagios status viewer. It grabs the status from a Nagios server and displays it in a fullscreen GUI. It is written in Java so it should run on all platforms (tested on Linux, AIX 6.1 and windows xp) capable of running Java 5. For compiling with GCJ you need at least version 4.4.5 of GCJ. It also runs fine with OpenJDK version 1.6.0 (and probably later). Main features Download CoffeeSaint-4.8.jar - can now set a minimum height per row so that if more than '--nrows' problems are to be displayed, the height of the rows is adjusted CoffeeSaint-4.7.jar - fixed a couple of bugs: command-line version did not work and escapes had problems Sourcecode: CoffeeSaint-src-4.8.tgz Example configuration file: bruin.conf . Manual The manual can be downloaded here . License In short: the jar-file is released under GPLv2. Screenshots Click on a picture to enlarge it This picture shows CoffeeSaint displaying a couple of problems with a webcam behind them. With font styles: Tips

Intelliden Brownfield networks are a challenge under average circumstances and potentially a large insider threat under the worst of circumstances. Brownfield networks are legacy networks that have been in service for such a long time they resemble the proverbial ball of yarn. Years of design and redesign, combined with a common “just get it running” operational mindset, create an infrastructure where no one person understands the true (not theoretical) network state. Adding to the challenges are the ongoing flux of operational and personnel shifts that make it hard to keep track of access to critical systems and result in large security, operational and regulatory exposure. An IT employee, for example, may perform a routine change to one portion of the network and inadvertently create a security hole into another part of the network thereby making the entire network vulnerable to a black hat attack. To continue reading, register here to become an Insider It's FREE to join

PasTmon - The Passive Application Response Time Monitor Open Source Security Information Management) Security for You, Powered by All. Join Us Today! Join OTX Now Leverage the Power of OTX to Stop Threats. About Open Threat Exchange AlienVault created the Open Threat Exchange (OTX™) in order to put good security measures within the reach of all businesses and organizations, but especially mid-market organizations that often cannot afford the tools and threat intelligence information that are available to large enterprises and federal governments. Through the Open Threat Exchange, security professionals on the front lines of cyber security defense and incident response now have access to free resources, projects, services and threat intelligence sourced by participants from around the world. AlienVault OTX is an open information sharing and analysis network that provides access to real-time, detailed information about incidents that may impact you, allowing you to learn from, and work with, others who have already experienced them.

Tech Bubble? Moderator Owen Thomas /VentureBeat and Panelists Paul Martino/Aggregate Knowledge; Christine Herron/First Round Capital; Corey Reese/Trumpet Technologies; Tim Chang /Norwest Venture Partners. Is the tech industry headed for bubble number two? That was the burning question for those who gathered at the Automattic Lounge on Pier 38 in San Francisco last Thursday. The panel was moderated by Owen Thomas, executive editor of VentureBeat. Martino doesn’t see any signs of a bubble yet, and noted that there have been only a handful of high profile market valuations recently, yet they have received a disproportionate amount of attention from the press that in turn contributes to a perceptual disconnect with reality. ”Silicon Valley is like high school — until you die,” said Chang, noting that the “hot people” get chased by everybody, and all the attention is on the prom queen and the team captain. So how do entrepreneurs create a bidding war these days?

It's Nagios Drupal Monitoring time for us dogs, now that Acquia is mumbling in its beer. | aWebFactory I still have my brown Acquia T-shirt that was distributed at the March, 2009 Washington DC DurpalCon. On the back it says "Free as in beer". Well, the free bit still applies to Acquia Drupal, and the various stacks which are useful for various operating systems and environments to a lot of people. But now Acquia is mumbling in their beer: no more freebie community style accounts, you gotta start paying for site monitoring via the Acquia Network once the initial 30 day trial period ends. OK, it does include goodies like Acquia search, and other stuff. This is a detailed howto article, but you can skip the parts that you don't need easily, and it will get you up and running with an enviable Nagios Drupal Monitoring station. What is Nagios? "So what are the sorts of things Nagios can do? from "What is Nagios", The Nagios Book Setting up the Nagios monitoring application. OK, first of all, we are talking about server environments and shared hosting is not convered in this article. . OK!

Memory Usage with /proc/meminfo | LinuxWebLog.com The entries in the /proc/meminfo can help explain what's going on with your memory usage, if you know how to read it. Example of `cat /proc/meminfo`: total: used: free: shared: buffers: cached: Mem: 1050001408 1012899840 37101568 0 113672192 420950016 Swap: 2097434624 217985024 1879449600 MemTotal: 1025392 kB MemFree: 36232 kB MemShared: 0 kB Buffers: 111008 kB Cached: 279304 kB SwapCached: 131780 kB Active: 677908 kB ActiveAnon: 487272 kB ActiveCache: 190636 kB Inact_dirty: 129164 kB Inact_laundry: 23948 kB Inact_clean: 15332 kB Inact_target: 169268 kB HighTotal: 131008 kB HighFree: 2336 kB LowTotal: 894384 kB LowFree: 33896 kB SwapTotal: 2048276 kB SwapFree: 1835400 kB Committed_AS: 1079884 kB The information comes in the form of both high-level and low-level statistics. At the top you see a quick summary of the most common values people would like to look at. Below are the individual values. High-Level Statistics Detailed Level Statistics VM Statistics Memory Statistics

Rainmaker Communications

Related: