Userexitd for TSM is a configurable handler for Tivoli Storage Manager events. It allows an administrator to filter events using regular expressions and run various actions for TSM events, such as sending mail and SNMP traps, writing messages into syslog, and running scripts and programs. This software consists of two parts: a simple shared library (userexit.so), which is dynamically linked to the TSM Server as a user exit and communicates using a socket with the userexitd daemon, which runs as a separate service. The daemon is configured with an XML configuration file.
Snare for Squid provides a remote distribution facility for Squid proxy server logs, and is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Squid can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.
GT Subset allows you to quickly and easily create subset databases for system testing and application development. It is a GUI utility that allows you to define any relationships required to subset data, as well as use existing database constraints. Selection criteria can be added at any level and can be changed at run time. Use it during system testing to build a smaller test database, to save disk space by reducing the amount of cloned data, to partition data in organizations, or to archive old data to history databases.
Simplebackup is a cross-platform backup program. It reads a configuration file, then it builds a compressed file for each of your backup directories or files on your backup list, and places the compressed files into another location. For example, this location can be a network mapped drive in Windows, an NFS mounted drive in Unix, another hard disk, an FTP server, an SFTP (Secure FTP) server, an HTTP (WebDAV) server, one or more email accounts, or a tape device (Unix only). This will duplicate your information, doing the so called "backup".
CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.
bdmn is client/server-oriented backup system. The daemon runs on the machine being backed up, and the client runs on the machine that stores the backup. It is very simple, but very fast. It only uses tar, gzip, uuencode, and Perl, so it is portable to many operating systems. It includes a very simple access control system for itself.
NEPM monitors and reports uptime, critical events and their predecessors, access rates, bytes-served rates, and error rates for network node equipment. Hardware and software elements within the nodes are tracked and reported separately to make possible rapid fault isolation. It is a very general, highly configurable, two-part software system that captures and analyzes logged performance data from IP-networked equipment and reports it via email and Web pages. Current conditions and history from systems based on Windows NT/2000, Unix, and Unix-style operating systems can be tracked and reported. Most major server, switch and router systems can be monitored, without running agents on the target systems. NEPM itself is system-independent and can be hosted on either a Unix or Win NT system or a combination of these with equal ease.
OTRS is a platform independent Web-based help desk system that supports service organization of any kind (e.g. IT service, customer and technical product service, complaint management, public services, etc.) to increase their efficiency. It increases transparency as well as service quality and lowers your total cost of ownership. It has been certified ITIL V3 compatible by PinkVERIFY for incident, problem, change, service asset and configuration, request fulfillment, and knowledge management. Other ITIL processes like service catalog and service level management are supported as well.