Saturday, October 23, 2010

"Open" first


Managed Objects (MO) company president and CEO Siki Giunta at the end of a two-day visit to China after the commitment of the Chinese market, the next three years, China plans to invest 10 million U.S. dollars, for the MO product development and market development. Currently, MO have already established a team of senior sales, systems engineers and technical support staff team.

On the systems management software, we first think of IBM, CA, HP, BMC. But the refinement to the business service management (Business Service Management, BSM) in the field, without mentioning-Managed Objects (MO).

Inception, MO JMI founder, after they received their first investment, the design and development of the BSM platform Formula. 2000, MO's BSM engine has matured, the company also will known as the world's leading supplier of BSM. Currently, more than 120 companies worldwide thousands of users in the use of MO solution, accounting for more than 50% of the BSM market share.

The face of IBM, CA, HP, BMC and other competitors, many people think that MO has been achieved it is not easy. But the president and CEO Siki Giunta did not think so. "MO solution to achieve the integration of IT and business, the best IT service quality and efficiency, and maximum business value provides a unique way." She said.

Like with most BSM products, MO-end solutions through Service Manager, Business Service Configuration Manager, Business Service Level Manager and business service dashboards combines four modules BSM software, services and methodology. The difference is, MO solutions address most of the existing systems management software products lack the open issues, mainly reflected in two things: to be integrated manufacturers of 40 different IT management software products; to two-way communication through the appropriate MO adapter to perform the integration products added to orders.

In addition, compared with other manufacturers, MO implemented the concept of a virtual CMDB.

Last year in June, MO U.S. survey of 200 IT executives found that despite the CMDB is the core of ITIL, but in how to build a CMDB on the existence of various possibilities. According to the survey found that most of the CMDB is updated infrequently. 48% of the survey are updated monthly CMDB, and even longer intervals, only 21% of people on a daily or timely updates. If IT management from simple to more complex services management, an accurate and effective CMDB is required.

"MO's virtual CMDB concept to reduce configuration complexity as a means." Siki Giunta stressed: "CMDB Management is the physical data. But practical point of view, in a single database to store all the data is unlikely achieved, this will result in data loss. The virtual CMDB is different, associated with the pointer the way can be realized, without too much time. "

Oracle Identity Management to strengthen compliance R3

Oracle Oracle's acquisition of Thor Technologies Inc. and OcterString after the upgrade of its original components, to build the latest version of the identity management R3. The new version supports 28 languages and can help companies obtain the user's access privileges of the current and past information, automatic data set has been defined as regular verification, and implementation of corrective actions to meet compliance requirements.

BEA opening part of the engine source code

Recently, BEA Systems, Inc. will have its own BEA Kodo persistence engine, an important part of the open source, the open-source project known as Open JPA. Open JPA yes a set of Java persistence API, to simplify the development process, allowing developers to concentrate on facing the 涓氬姟 matters, rather not writing and testing infrastructure code on to Zhong Fu labor.

CA protected PC from online threats

New version of CA eTrust Internet Security Suite is the CA for the home users a comprehensive network security solutions. Just install one, CA eTrust Internet Security Solution Suite r2 can provide users with comprehensive protection so users from hackers, viruses, identity theft, spyware and spam and other Internet security threats, but also access to new parents control functions.






相关链接:



Suning to the "conspiracy theory" fight back country U.S. provocation



The complete production process of a CG - 2 color (background color)



"Chino conflict" Comment



Japanese rebirth



ARTICLES about Audio Speech



Audio Rippers And Converters Catalogs



E-cology in the Pan Micro Series 42



Name enterprises HR field coaching "candidates"



ntoskrnl.exe missing how to repair these pc



AVI to iPod



"Journey" amending the law of my magic battle + guardian



DVR-MS to MPG



MKV To MOV



"Aion" 1.2 There are a brush obs of the bug is still alive



20GB PS3 price cut 16% support for HDMI



Shop Dictionaries Education



No comments:

Post a Comment