Skip to main content

StackSafe Upgrades Test Center with External Infrastructure Connectivity

Vienna, Va. – June 02, 2008 – StackSafe, Inc., a provider of pre-production staging and testing solutions for IT Operations teams, announced today the external infrastructure connectivity upgrade to its staging and testing solution, StackSafeTM Test Center. The solution creates a virtual copy of the software infrastructure stack and enables IT Operations teams to better test the impact of changes before releasing them to the production environment, reducing the uncertainty and downtime related to IT changes. With this upgrade, the virtualized Test Center environment can be extended to interact with non-virtualized system components that reside outside of the Test Center environment – enabling test scenarios across the entire end-to-end IT service.

Virtualization technology offers the potential to deliver time-stressed, resource-thin IT operations staff a low risk way to test and assess the impact of making changes to the IT production environment,” commented Richard Ptak, Founder and Analyst, Ptak Noel & Associates. “Stacksafe’s Test Center provides a validation environment that resolves a number of existing application deployment issues.”


Complex software infrastructure environments may include components that cannot be virtualized into StackSafe Test Center. These include physical storage tiers, large databases, hardware-based network topologies, or distributed components not owned by the IT Operations team. By enabling the inclusion of these components in the test scenarios, users can now have a more complete view of the impact of changes across the entire end-to end IT service.


The addition of external infrastructure connectivity adds the following key features:

  • Enabling inbound connectivity from external infrastructure components and services into Test Center

  • Enabling outbound connectivity from Test Center to external infrastructure components and services

  • Customized control of connectivity options


"After releasing Test Center earlier this year, we moved quickly to support external connectivity because it enables customers to test against elements that could not be virtualized due to complexity or access such as large storage databases and distributed infrastructure components,” said Loren Burnett, president and CEO of StackSafe. “By accommodating extended infrastructure in the testing process, this updated version enables us to better deliver on our promise of reduced downtime and more effective change and release management.”


Availability

As part of StackSafe Test Center’s subscription licensing model, the updated release of Test Center is generally available to current Test Center users at no charge. For more information, please visit www.stacksafe.com.


About StackSafe, Inc.

StackSafe provides software infrastructure testing solutions that enable IT Operations to significantly improve uptime and resiliency. StackSafe’s flagship product, StackSafe™ Test Center, directly addresses the challenge of incomplete and ineffective IT Operations staging and testing of changes to multi-tiered software infrastructure stacks. With Test Center, StackSafe provides the first easy-to-use virtualized staging and testing solution that enables IT Operations to understand the business impact of changes––before they touch production systems. Test Center was awarded the 2008 ITIL Innovation of the Year award at the International IT Service Management Conference and Exhibition. Based in Vienna, Virginia, StackSafe serves IT Operations teams across multiple vertical markets. For more information, visit www.stacksafe.com.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!