Category

How Orca Works

Agent-based configuration management

By | Automation, How Orca Works, Visibility | No Comments
What you should know about Orca’s agent Smaller, faster, street-smart We get a lot of questions about our agent. In fact, we are often asked why Orca even uses an agent. This page provides all the information you need to know about our agent – why it’s needed, why it’s better, and why it’s so powerful. First impressions can be lasting impressions We have found that the...
Read More

How to Compare Configurations Accross Your Environment

By | Automation, How Orca Works | No Comments
Compare configurations across applications, middleware, databases and operating systems. Looking for a way to compare configurations? Or a config diff tool? Here is a way to automatically compare configurations in IIS, WebSphere Application Server, SQL Server, Oracle,  and more. Now that we’ve told you how Orca determines your infrastructure configurations, let’s look at how Orca can compare configurations. In this complex world of configuration, “compare” can mean different...
Read More

How Orca Works. A Summary.

By | How Orca Works, Orca Blog | No Comments
Using Orca Orca is an application release and configuration automation platform that delivers 1) Central, Secure Control & Compliance Enforcement  2) Intelligent Workflow Automation of Linux, Unix and Windows ecosystems  3) Application Ecosystem Modeling & Visibility and 4)  Audit-ready  Reporting. For more information on How Orca Works, please view our Orca product sheet and whitepapers or request a demo overview.  1) Central, Secure Change Control & Compliance Enforcement  Orca inventories all of your...
Read More

DevOps Approach to WebSphere Application Server Configuration Management

By | Annoucements, How Orca Works, Orca Blog, WebSphere Application Server, Why Orca | No Comments
WebSphere Application Server configuration management does not have to be so difficult Time for a DevOps approach WebSphere Application Server configuration management: Traditional Approaches lead to Traditional Challenges Today admins are currently forced to do one of three things to configure their WebSphere Application Server (WAS): Use the WAS admin console to manually view configurations Write and maintain wsadmin scripts, or Maintain wsadmin scripts through an automation tool....
Read More

Ecommerce Holiday Readiness Checklist

By | How Orca Works, Orca Blog | No Comments
5 Steps for Black Friday, Cyber Monday and Holiday Readiness Ho. Ho. Ho. It’s that time of year again. Seriously. It is. It’s way too late for April Fools but it’s definitely not too early for ecommerce holiday readiness planning. In fact now is the perfect time to get your ecommerce house in order well before the planned lockdowns of your critical web based applications. Balance...
Read More

Scripting-Centric Automation vs Intelligent Workflow Automation

By | Automation, How Orca Works, Orca Blog | No Comments
Comparing Multi-step Scripting with Drag & Drop Deployments When it comes to deploying changes throughout your enterprise-scale, AIX, Linux and Windows application environment, there is Scripting-Centric “Automation”…and there is Intelligent Workflow Automation. Puppet, Chef and Orca are all used to maintain desired state and deploy routine configuration changes. But how they manage configurations and deploy those changes is very different. Puppet and Chef use scripting-centric automation while...
Read More

Ecosystem Modeling for Visibility & Compliance Enforcement

By | Ecosystem Visibility, How Orca Works, Orca Blog | No Comments
Modeling Your Application Ecosystem Ecosystem Modeling for Visibility & Compliance Enforcement Modeling your application ecosystem (including related applications, databases, middleware and servers in mixed Linux-Windows environments) is a powerful way to create intuitive birds-eye views of your environment as well as granular views of the full stack configurations that tie your infrastructure together - physical, virtual and cloud. Due to limited choices many IT organizations resort...
Read More

DevOps Security through Change Control

By | Compliance, Control, How Orca Works, Orca Blog | No Comments
NEW White Paper: Achieving and Maintaining PCI Compliance with Centralized, Automated Change Control Enhance Security with DevOps Change Control  Devops teams value fast-moving, efficient releases, updates and improvements. Security teams value caution and analysis. So the topic of "DevOps Security" is a timely one. A few things are already clear: DevOps Security cannot simply be an add-on. If only it were that simple. No silver bullets....
Read More

Compliance Reporting and Compliance Audits

By | Compliance, How Orca Works, Orca Blog | No Comments
How to Win at Compliance Reporting and Compliance Audits In IT, it’s hard enough satisfying your customers, colleagues, calendars and bosses with the software that you build and operate. But signing up for a life in IT should not mean that you signed up for a never ending root canal in the form of one tedious, nearly impossible-to-satisfy compliance audit after another. Audits and compliance...
Read More

CIO Series: What is your Configuration Management Software ROI?

By | CIO Series, How Orca Works, Orca Blog, Risk / ROI | No Comments
(Looking for our configuration software ROI tool? Click here.) Sometimes you just ‘get it’. When you see and experience a true DevOps tool, you quickly and intuitively understand the savings in time and hassle that come from using it. Sometimes though it can be difficult to quantify the value of those savings and other benefits to colleagues, managers and finance people who have not used the tool or very possibly may not...
Read More

Role based access control (RBAC) for Apps, Database and Middleware

By | Control, How Orca Works, Orca Blog | No Comments
When we talk to systems administrators and other IT leaders about what they expect from their management solutions, we tend to hear a few common themes – and one of those themes is “Control”. Controlling when, how and where changes are promoted is central to Orca. But that is not quite enough. We also know that you need to control who can view and manage...
Read More

Agent vs Agentless with SSH

By | How Orca Works, Orca Blog | No Comments
What about agentless configuration management (CM)? First impressions can be lasting impressions We have found that the arguments against agents are usually related to really bad experiences with really poorly written agents. In many cases companies develop agents without really considering what the right tool for the job is. That means you wind up with a Java based agent that brings along with it a massive runtime...
Read More

Configuration change management – coordinating calendars

By | Control, How Orca Works, Orca Blog | No Comments
Configuration change management is difficult enough.  But planning configurations, coordinating personnel, using proper technologies and scheduling them within tight windows just seem to complicate an already complex task. What would make it better? Scheduling configuration changes, blackout dates and maintenance windows within your existing calendar system More than 2/3 of IT professionals preferred a tool that managed upcoming configuration dates, blackout dates and maintenance windows. Coordinating your...
Read More

How to control configuration drift…beyond configuration monitoring

By | Control, Ecosystem Visibility, How Orca Works, Orca Blog | No Comments
Drift Happens Configuration drift is a widely experienced problem felt by most, if not all IT departments.  While there are a variety of causes of configuration drift, the degree of impact can vary from merely annoying to catastrophic.  It usually plays out like this: Your team is rolling out a new web based application.  Everyone is fired up because it works great in Dev, and...
Read More

Start your free trial by accessing an online installation of Orca.