SHARE
Facebook X Pinterest WhatsApp

Absolute Software Aims to Enable Self-Healing Applications

6 Tips for Hiring Remote Tech Employees Absolute Software has built an OEM business around firmware that makes it easier for vendors to manage various types of endpoints using agent software that makes sure software on those devices remains persistent any time that endpoint is turned off or the device needs to be rebooted. This […]

Written By
MV
Mike Vizard
Feb 8, 2017
Slide Show

6 Tips for Hiring Remote Tech Employees

Absolute Software has built an OEM business around firmware that makes it easier for vendors to manage various types of endpoints using agent software that makes sure software on those devices remains persistent any time that endpoint is turned off or the device needs to be rebooted. This week, Absolute Software announced it is now making the same capability available to application developers.

Kim Ellery, director of product marketing for Absolute Software, says there are over a billion devices, ranging from PCs and mobile computing devices to security appliances that have firmware with Absolute software preloaded on them. Developers can now take advantage of that firmware to maintain application persistence. That new Application Persistence offering can be applied to new applications as well as existing legacy applications, says Ellery.

The goal, says Ellery, is to provide both commercial and corporate developers with a means to instantly remediate their applications in real time by making it possible for applications to self-heal.

“We have 28 vendor partners that have loaded our OEM’s firmware on over a billion devices,” says Ellery. “That creates the opportunity to also have self-healing third-party applications.”

Developers and the IT operations teams that support their applications spend an inordinate amount of time and effort on maintaining applications. By employing Application Persistence, IT organizations can remotely reinstall any application that winds up getting removed or return an application to its original state should it be compromised by malware.

Whatever the underlying cause of the problem, the day when someone from the IT department needed to be dispatched to manually perform that task is mercifully coming to an end.

Save

Save

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.