Justin B Rye
jbr at edlug.org.uk
Sat Nov 11 00:28:07 CET 2006
Alina Barbuceanu wrote:
> Event automation tools automate the response of the system to
> nonscheduled system and application events (included are global
> event management applications and console automation products).
> For example the Tivoli TEC Event Monitor
> ( http://schist.und.nodak.edu:8888/SiteScope/docs/TivoliAlert.htm ).
"Nonscheduled events" being a euphemism for "disasters", right?
Service availability monitoring, along the lines of nagios.
> Job scheduling tools manage the flow of work on systems. This
> category includes batch job schedulers and workload balancing
> applications working at the application (rather than system) level.
> For example the Tidal Enterprise Job Scheduler
> ( http://www.tidalsoftware.com/products/products_TES_Overview.asp )
A solution for problems I don't quite grasp the specific nature
of... that works in ways I can't quite make out. Oh well.
> Output management tools automate the production, distribution and
> management of computer-generated information.
> For example Computer Associates Dispatch Output Management
> ( http://www3.ca.com/solutions/overview.aspx?ID=1250 )
The part I hadn't picked up on is that this is handling reports.
It's software for pulling sets of stats out of spreadsheets etc, and
automatically making them available to the right people. Makes
sense, but I can't think of any free software that does it.
> Performance management software is used for capacity planning,
> performance data collection, performance tracking and simulation.
> A good example would be BMC's Patrol
> ( http://www.bmc.com/products/products_services_detail/0,,0_0_0_2001,00.html )
Evaluating the bang/buck ratio of your IT infrastructure. I'm
vaguely impressed by the idea that they can automate that, but I've
no idea where we'd catalogue it.
> Software Configuration Management Tools are used by application
> development organizations to provide software revision control and
> versioning capabilities. More sophisticated functions, such as
> process management, change request tracking, requirements
> management, and distributed team development support, may also be
> For example IBM Rational ClearCase
> ( http://www-306.ibm.com/software/awdtools/clearcase/index.html )
One I understand even without following the link! Version control
with software-project-management features.
> Enterprise Connectivity includes software that enables devices to
> exchange, modify, and/or present network data.
> For example EXTRA! From Attachmate
> (http://www.attachmate.com/en-US/Products/Host+Connectivity/Terminal+Emulation/Extra/ )
This still sounds like paying good money for stuff you should have
got in your OS base-install... It touches on various security:: and
network:: tags, and also reminds me that we could do with a
replacement for "Section: otherosfs" and the defunct "foreignos::".
> Source & Site Protectors refer to software that encodes websites
> to help protect against code and design theft (preventing text
> from being selected, blocking right mouse clicks from displaying
> For example PageLockWebsite Copy Protection from Multimedia Australia
> ( http://mmaus.com/pagelock.html )
that could get into the Debian package archives. Though oddly
enough we do have a couple of open-source source-obfuscators.
> Threat Management Software represents software that is designed
> for enterprises and it's a separate class in the Iterating product
> class tree because it consists of multi-function appliances that
> feature AV, IDS/IPS, content filtering etc.
> For example the CA INTEGRATED THREAT MANAGEMENT R8 SOLUTION
> ( http://www3.ca.com/Press/PressRelease.aspx?CID=81892 )
This maps to our security:: facet. On GNU/Linux the anti-malware
stuff mainly exists as mailserver plugins, and it makes more sense
to integrate it with spam-filtering than with IDS/firewalls/etc.
(I have to say, for me, "Management" has all the wrong connotations
for this kind of thing: it's the organisational infrastructure
around a task as distinct from the actually-doing-the-work part, and
it's also what you do with endangered wildlife when you want to
build up their stocks. All in all, Threat Management Software
sounds like it's a contacts database for blackmailers!)
> Secure Content Management represents software used to screen and
> exclude from access or availability web pages or e-mail that is
> deemed objectionable. It is usually used in companies to protect
> against transmission confidential information.
> For example eTrust Secure Content Manager
> ( http://www3.ca.com/solutions/Product.aspx?ID=4673)
A rather strange euphemism for censorware. That may get our hackles
up, but it is after all legally required in various contexts, and we
have a couple of things that can do it.
> Third-Generation Language Tools are software development tools
> used specifically for third-generation languages, such as FORTRAN,
> COBOL, BASIC, Pascal and C (they refer to IDEs).
> A good example is Jbuilder from Borland
> ( http://www.borland.com/us/products/jbuilder/index.html )
(Looks it up... okay, "1GL" is raw binary machine instructions,
"2GL" is assembler mnemonics and "3GL" is pretty much anything I'd
recognise as a programming language. Then "4GL" is SQL and, for
some reason, Visual Basic, "5GL" is an idea that somehow slid
directly from vapourware to obsolescence ten years ago, and there's
no sign of a "6GL".)
> Software Construction Components are functionally specific
> software subassemblies and libraries sold apart from a programming
> development environment that may or may not be designed to be used
> with a specific programming development environment.
> For example class libraries, frameworks, ActiveX controls, Java
> applets, JavaBeans, Enterprise JavaBeans, DLLs, and other forms of
> API-specific libraries.
Software libraries. We've got those covered.
Ankh kak! (Ancient Egyptian blessing)
More information about the Debtags-devel