{"id":1281,"date":"2003-12-22T00:00:00","date_gmt":"2003-12-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/22\/novadigm-jumps-into-utility-computing-fray\/"},"modified":"2021-12-30T11:39:05","modified_gmt":"2021-12-30T11:39:05","slug":"novadigm-jumps-into-utility-computing-fray","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/22\/novadigm-jumps-into-utility-computing-fray\/","title":{"rendered":"Novadigm Jumps Into Utility Computing Fray"},"content":{"rendered":"<p>Change management provider Novadigm Inc. is delving into the utility computing space with a series of enhancements planned for its Radia Server Management software that will streamline configuration changes across servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among the other Radia enhancements are a series of templates for commonly used applications that allow users to systematically provision the server applications without having to learn the intricacies of each installation and configuration.  The customizable templates work with The Apache Software Foundation&#8217;s Web server; Microsoft Corp.&#8217;s Internet Information Services, Active Directory and SQL Server; BEA Systems Inc.&#8217;s WebLogic; IBM WebSphere; Sun Microsystems Inc.&#8217;s Sun ONE Directory Server; and Oracle Corp. applications on Windows, Unix and Linux.<\/p>\n<p>Novadigm is also extending the suite&#8217;s platform support across operating systems, blade servers and load balancers.  New native operating system installers supported include Hewlett-Packard Co.&#8217;s HP-UX Ignite, Microsoft&#8217;s Automated Deployment Services and Sun&#8217;s Solaris JumpStart.  Radia Server Management also supports Intel Corp.-based blade servers from IBM, HP and Dell Inc., and it is integrated with load balancers from F5 Networks Inc. and Cisco Systems Inc.<\/p>\n<p>More info: [url=http:\/\/www.eweek.com\/article2\/0,3959,1419832,00.asp?kc=EWRSS03119TX1K0000594 ]http:\/\/www.eweek.com\/article2\/0,3959,1419832,00.asp?kc=EWRSS03119TX1K0000594[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1281","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1281"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1281\/revisions"}],"predecessor-version":[{"id":3768,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1281\/revisions\/3768"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}