Tango/04 Launches Service-Oriented IBM i Monitoring Package
September 04, 2012
Share this

Tango/04 Computing Group announced immediate availability of its brand new Operations Knowledge Module for IBM i.

The package is a complete monitoring environment comprised of its flagship VISUAL Message Center, IBM i native and agentless monitoring agents, a collection of best practices based on more than 20 years expertise, providing modern, agile and business-aligned availability and performance management of IBM I systems and applications.

It also includes automatable reports, Web- and tablet-enabled real-time dashboards and a unique Business Service Management (BSM) model.

“It is sad to still see people monitoring their systems the way they did in the nineties,” says Raul Cristian Aguirre, Tango/04 CEO, “focusing on isolated components instead of business services. We have much more mature frameworks for service-oriented management now. In the end, aligning monitoring with the Business means more recognition and credibility for the IBM i team and for the whole IT department. It is a step in the right direction, for many good reasons.”

Tango/04 is a recognized player by leading industry analysts in both Event Correlation and Analysis and BSM. The company, with strong roots in the AS/400-iSeries-IBM i platform since 1991, developed a proven, ITIL-aligned and agile way to quickly prioritize technical incidents and to deploy Continual Service Improvement (CSI), ensuring immediate root-cause detection of business-impacting events and allowing the delivery of improved service quality. These best practices are packaged into this unique IBM i offering, which is extremely quick to deploy and easy to use.

This solution is designed to be deployed in just a few days and can be customized with drag-and-drop easiness to manage Service Levels of packaged or custom applications.

It also has the potential to expand into Security and Compliance, full multiplatform monitoring, or even to become a full-fledged enterprise BSM solution with a much more attractive ROI than other legacy solutions.

“Our competition is still playing catch-up with our native IBM i monitoring technology,” adds Aguirre, “but we are leap-frogging them again by leveraging our agile service-oriented expertise and award-winning solutions. And the good thing is that the more our customers align with the business, the more we see them recognized, congratulated and promoted. This is powerful stuff, and it really works.”

Share this

The Latest

August 21, 2018

High availability's (HA) primary objective has historically been focused on ensuring continuous operations and performance. HA was built on a foundation of redundancy and failover technologies and methodologies to ensure business continuity in the event of workload spikes, planned maintenance, and unplanned downtime. Today, HA methodologies have been superseded by intelligent workload routing automation (i.e., intelligent availability), in that data and their processing are consistently directed to the proper place at the right time ...

August 20, 2018

You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Steps 5 through 10 will help you maximize the performance of your applications and underlying network infrastructure ...

August 17, 2018

As a Network Operations professional, you know how hard it is to ensure optimal network performance when you’re unsure of how end-user devices, application code, and infrastructure affect performance. Identifying your important applications and prioritizing their performance is more difficult than ever, especially when much of an organization’s web-based traffic appears the same to the network. You need insight to maximize performance — not inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. But you can stay ahead. Follow these 10 steps to maximize the performance of your applications and underlying network infrastructure ...

August 16, 2018

IT organizations are constantly trying to optimize operations and troubleshooting activities and for good reason. Let's look at one example for the medical industry. Networked applications, such as electronic medical records (EMR), are vital for hospitals to provide outstanding service to their patients and physicians. However, a networking team can often not be aware of slow response times on the remotely hosted EMR application until a physician or someone else calls in to complain ...

August 15, 2018

In 2014, AWS Lambda introduced serverless architecture. Since then, many other cloud providers have developed serverless options. What’s behind this rapid growth? ...

August 14, 2018

This question is really two questions. The first would be: What's really going on in terms of a confusion of terms? — as we wrestle with AIOps, IT Operational Analytics, big data, AI bots, machine learning, and more generically stated "AI platforms" (… and the list is far from complete). The second might be phrased as: What's really going on in terms of real-world advanced IT analytics deployments — where are they succeeding, and where are they not? This blog will look at both questions as a way of introducing EMA's newest research with data ...

August 13, 2018

Consumers will now trade app convenience for security, according to a study commissioned by F5 Networks, The Curve of Convenience – The Trade-Off between Security and Convenience ...

August 10, 2018

Gartner unveiled the CX Pyramid, a new methodology to test organizations’ customer journeys and forge more powerful experiences that deliver greater customer loyalty and brand advocacy ...

August 09, 2018

Nearly half (48 percent) of consumers report that they currently use, or have used in the past, services of organizations that were involved in a publicly disclosed data breach and, of those, 48 percent have stopped using the services of an organization because of a breach, according to Global State of Digital Trust Survey and Index 2018, a new report from CA Technologies ...

August 08, 2018

Here's the problem: IT teams are in the dark. The only information they have available to them is based on what users decide to tell them about through calls to the help desk ...