
Open source infrastructure
The effectiveness of your information system is linked to
the system and network infrastructure on which it rests: our mission is to
support you in the optimization of the infrastructure while reducing costs.
For this, we recommend open source tools, and many now
mature enough to cover each layer of a software infrastructure. For simplicity,
we group the different types of solutions into four families:
- Monitoring performance:
Infrastructure supervision and monitoring of website
- Infrastructure Optimization:
Performance testing and tuning, virtualization software and
appliances
- Access Management:
Public Key Infrastructure (PKI, PKI, PKI), LDAP and SSO
(Single Sign On)
- Migrating to open source:
Re-packaging of Linux distribution, messaging, office suites
and groupware.
To implement your solution, our services range from analysis
and consulting to implementation and training of your teams. If you want to
make yourself this solution, we can assist you in project management, or provide
you with our expert engineers for support during all phases of your project.
Monitoring performance: infrastructure supervision and
monitoring of website
You want to control the evolution in time of performance of
your system and network infrastructure: we advocate the implementation of
Nagios, a monitoring solution that references in the open source universe. From
project conception to the use of the interface through the installation of
"probes", we help you control in a simple and efficient the operation
of your infrastructure.
To measure the availability of your website, there are many
monitoring solutions.
Infrastructure Optimization: Performance testing and tuning,
virtualization and software appliances
To optimize the dimensioning of individual bricks of your
infrastructure (database, application server, file system...) or to anticipate
their scalability, we carry with you a series of performance tests (under load,
maximum capacity, response to stress...). You can now find the fine tuning of
your infrastructure and adapt it over to your needs.
Optimizing your infrastructure password also and especially
by the virtualization, which simulates, in a physical server, the existence of
several partitioned servers and shared. This will reduce your equipment costs
and maintenance, while enhancing manageability and security of your server
farm. A proven practice and promising future, which becomes all the more
interesting open source tools such as mature and powerful Xen release CIOs of
some budgetary and technical constraints.
Beyond their intrinsic benefits (no license fees,
scalability, adaptability...) the open source virtualization solutions
facilitate the creation of software appliances (or "application
packages"), will revolutionize the administration system. Indeed, by
associating with each application a complete and stable base (OS, DBMS, system
tools, framework, portal, etc...), Management and software compatibility
between each application environment is immediately solved!
Access Management: Public Key Infrastructure (PKI), LDAP and
SSO (Single Sign On)
Type solutions PKI allow you to secure your electronic
relationships by guaranteeing confidentiality, authentication, integrity and
non-repudiation, whether through signing certificates (e-mail or web access) or
encryption (encryption keypair).
Securing identity management, we facilitate the development
of transactional activities, whether external (contractual and commercial) or
internal (staff accountability). We can especially help you implement Open SSL,
a reliable and reputable in this field.
To complete the improvement of access management within your
infrastructure, LDAP is the reference solution to centrally manage the
attributes (characteristics and privileges) of all your users, with a tool such
as Open LDAP, the various components of your information system using a single
user base.
As for the solutions of SSO (Single Sign On), they enhance
the usability of your entire application front end, preventing your users from
having to login several times - an initial identification of attributing
automatically and transparently authorizations subsequent access. We master the
tool including CAS, whose quality and legitimacy are recognized.
Software front end: re-packaging of Linux distribution,
messaging and groupware...
While open source has developed on software layers deep or
reserved for technicians, it is now natural to equip the user computer with
free software. Indeed, at comparable functional scope, budget and technical
advantages make the difference and difficulties are reduced essentially to user
training.
That is why we integrate our systems and networks offer
benefits consulting migration to software "users" from the world of
open source.
0 comments:
Post a Comment