begin Scott Prater quotation of Tue, Dec 04, 2001 at 10:08:40AM +0100:
> 
> I'm one of the recent converts from BB to mon.  We use mon purely as a
> backend, way, way at the back -- there are several wrappers of other
> programs that mon alarms pass through before finally being displayed in an
> in-jhouse java-based interface.

I think it's entirely on-topic to discuss monitoring architectures
we've built upon Mon. Scott, without giving away trade secrets, etc,
etc, could you give us a little info on how you've built yours?

I have strange ideas in my head about different ways I could use Mon as
a "backend" as you've alluded to, so I'm interested in what others have
done.
-- 
Nate Campi        http://www.campin.net        GnuPG key: 0xC17AEF79   
Key fingerprint = BF12 722F 8799 E614 33CC  FAB7 5A90 C464 C17A EF79

The Strong Lusethropic Principle states: "The more idiot proof the
software, the more it encourages the user to be careless and not
think. Therefore, idiot-proof software actually encourages,
contributes, and actually CAUSES lusers to be stupid."  
. 
The Weak Lusethropic Principle states: "As more idiot-proof software
becomes available, more idiots are able to use computers. Idiot-proof
software did not make or cause computer lusers; it simple allowed
lusers to use computers where they could not before."  

Reply via email to