Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/18/2010
09:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Application Monitoring Comes To Microsoft's Open Source Hosting Site

Runtime Intelligence Service will publish application and feature usage statistics for Microsoft's CodePlex

CLEVELAND, OH, May 12, 2010 - PreEmptive Solutions, a leading provider of solutions to measure, manage, and protect applications, announced today that its Runtime Intelligence Service will publish application and feature usage statistics for Microsoft's CodePlex open source hosting service.

Developers use Runtime Intelligence to improve user experience, validate usage assumptions, and improve the overall quality of their applications. Potential users of these applications can use Runtime Intelligence to better identify which applications are being used most often and even what features are most popular.

With the release of the latest version of the CodePlex site on May 6, 2010, developers can inject application monitoring technology into their applications using Dotfuscator' (either the Community Edition included with Microsoft Visual Studio 2010 or the commercial edition licensed by PreEmptive). The instrumented applications stream usage data to PreEmptive Solutions Runtime Intelligence Portal where it is then integrated into, and published by, the CodePlex website at www.codeplex.com.

"Developers always want reliable data on how their applications are performing in the wild," said Jonathan Wanagel, senior development manager of Server and Tools Online at Microsoft Corp. "The truly unique dimension that publishing this kind of information to an open-source community brings is that now potential users will have the same degree of visibility and that will help to drive adoption of quality open-source applications."

"The CodePlex team has truly raised the bar on what open source developers and end users should expect from their hosting platforms," said Gabriel Torok, president of PreEmptive Solutions. "We are proud that Dotfuscator and the Runtime Intelligence Service are a part of this solution."

Dotfuscator injects all of this functionality into compiled assemblies and that means that both existing and future projects can take advantage of this service immediately. In fact, within the first 48 hours that this service was available, nine distinct development projects updated and distributed their applications and are already publishing runtime intelligence data for all to see.

Developers can learn more by visiting http://codeplex.com/runtimeintelligence for documentation and a tutorial. Visitors to the CodePlex site can see the resulting usage data alongside existing download and web page view statistics. An example can be seen on the Application Runs chart at http://rivisualizer.codeplex.com/stats.

About PreEmptive Solutions PreEmptive Solutions produces the Dotfuscator and DashO application protection, monitoring and management product families and the Runtime Intelligence Service. With more than 4,000 corporate clients, 40,000 registered installations in 100+ countries and inclusion with Microsoft's 6,000,000+ Visual Studio seats, PreEmptive Solutions is the clear choice for every organization serious about protecting, measuring and managing their application investments. For more information, visit www.preemptive.com or call +1 440.443.7200.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...