Results for the tag,


Application Performance Management

Application Performance Management: Application performance management, or APM, refers to the discipline within systems management that focuses on monitoring and managing the performance and service availability of software applications. APM can be defined as process and use of related IT tools to detect, diagnose, remedy and report application’s performance to ensure that it meets or exceeds end-users’ and businesses’ expectations. Application performance relates to how fast transactions are completed on behalf of, or information is delivered to the end user by the application via a particular network, application and/or web services infrastructure.  (Source: Wikipedia)

Do ‘Network Monitoring’ solutions Help or Hinder the Online Customer Experience?

Section: Articles
Considering the very large investments made by businesses and service providers in network monitoring solutions, why is poor service quality still the number one complaint from online customers? Have the customer demands for the online experience changed or is the prob ...   read more

Does lack of Net neutrality destroy the benefits of network monitoring?

Section: Articles
What is Net Neutrality? In simple terms it is the principle that all Internet users are equal and there are no restrictions imposed by Internet service providers on user's content, on the publisher or the content, on the usage of the content or performance of the flow of content. I have often used the similarities of road traffic to ...   read more

Is Network Traffic Monitoring Failing – Customer Complaints Remain Number 1 Problem

Section: Articles
Despite network monitoring tools consuming hundreds and millions of corporate dollars, customer complaints for poor service are at an all-time high consuming even more of the corporate budget. To understand why network monitoring fails in its objective, it is first necessary to examine how the use of networks has transitioned in the last ten to fifteen years. Network traffic patterns have dramatically changed. With few exceptions, the early years of the internet were drive ...   read more

London Olympics traffic light policy changes exposes identical problems for Internet traffic

Section: Articles
For those who have had the privilege of driving in London you will be only too aware that traffic moves at a snail’s pace throughout the day and then slows down during rush hours.  Traffic demand that exceeds the capacity of extremely narrow roads delivers the expected result of frustratingly long delays.  If one must drive into London to meet at an appointed time, the traveler would be well advised to plan the journey with time to spare or plan on missing it. F ...   read more

Network Monitoring- Why we need it, and why it doesn't work

Section: Articles
One of the first things the network manager of an enterprise will do, if it hasn't been done already, is implement a network monitoring system. Considered an essential part of the network, much time, money and effort is put into deploying and maintaining a monitoring system, and even more time, money and effort into interpreting the results. For a large enterprise, costs can run into the hundreds of thousands of dollars annually, though fortunately for the purveyors of network monitoring syst ...   read more

70% of IT Managers can’t Measure Performance in Cloud

Section: News
Cloud computing is changing the way that IT infrastructures as a whole, and IT managers as a profession, are structured in the workplace and according to a recent survey, many are unsure how the changing landscape is affecting their job. The study , carried out at t ...   read more

Desktop virtualization has 'major security advantages'

Section: News
One of the major security advantages of desktop virtualization is that it allows firms to keep their employees' mobile devices free of sensitive company data, according to Citrix. The firm is already using its own products to bolster cloud security as its staff turn to mobile devices ...   read more

Flash Update for Zero-day Flaws

Section: News
Adobe has released two critical updates to address zero-day flaws, which are both under "active attack” by hackers. Windows and Mac users are both affected, although one of the exploits is being used in targeted attacks that tricks users into opened an email attachment. The attachment is a Word document and contains malicious Flash content and targets the ActiveX version of Flash Player on Windows. The other vulnerability attacks Safari and Firefox running on Macs and c ...   read more