monitoring

Application Performance Monitoring Best Practices – Dealing with False Positives

When monitoring any application for anomalies, the challenge can be that each individual parameter being monitored will stray outside of its expected normal range of operation, but unless other parameters are also showing stress this may not be important. But when a series of different parameters all start to show a change in the same [...]

What is IBM MQ?

IBM MQ (often called “MQ”, WebSphere MQ or “IBM MQ”) is IBM’s Message Oriented Middleware offering that enables an asynchronous program-to-program communication via queues. It has been designed to operate largely as a “black-box”, in that it supports unattended operations, and is largely transparent to applications, and runs as multiple background processes. It enables applications [...]

The Basic Ways of Monitoring MQ

There are several facilities and techniques available to identify and resolve problems with MQ Series. EVENT MONITORING MQ Series publishes several event messages in some special SYSTEM Queues to indicate a failure, potential slowdown, change in configuration, security violation etc., These events can be turned on or for the Queue Manager level and for Queues [...]

Improving MTBF and MTTR

I was having a discussion today with a customer about how they measure and reduce risk. And it came down to a simple understanding of MTBF and MTTR. If felt a little like going back to basics, but the simple fact is the basics are, the basics. MTBF (Mean Time Between Failures) is a measure [...]

By |blog, monitoring, tracking transactions|

Intelligently Monitoring IOT

I was recently talking with a company that manages environmental and AV systems for large buildings. They use the most advanced technology, which in this case is IOT (Internet of Things). They setup control systems to control light, HVAC, window shades, door locks, AV displays, speakers and more. In a large building this can be [...]

By |monitoring, tracking transactions|

The Six levels of Application Performance Maturity

Level 1 Hope & Pray Many companies build business applications iteratively, starting with a proof of concept and then using creative internal and external talent to build out the concept into a working prototype. Which is then extended into product. I’ve seen systems built this way that deliver very powerful innovative ideas. The challenge is [...]

IBM Partners: Top Picks of Disruptive Offerings at Think 2018

In a recent Forbes article, leading industry analyst and Forbes contributor Jason Bloomberg lists his top picks from Think 2018 of disruptive capabilities and offerings complementary to IBM’s focus on cloud and data, artificial intelligence (AI),  blockchain and security. Among the vendors listed from Think 2018, he included Nastel's comprehensive monitoring capabilities across hybrid environments. [...]

Service Level Agreements: The Dos and Don’ts of SLA Management

The past few years have seen a huge increase in the amount of critical IT services that companies outsource to SaaS/IaaS/PaaS providers, be it security, storage, monitoring, or operations. Of course, along with any outsourcing to a service provider comes Service Level Agreements (SLA) to ensure that the vendor is held financially responsible for any lapses [...]

Monitoring Kafka: Real-Time Ops Challenge

Monitoring Kafka: Real-Time Ops Challenge Let’s say you’re a long-time expert on message-oriented middleware – say, an MQSeries (now IBM MQ) pro from back in the day – and someone asked you to create an entirely new middleware product following modern, cloud-native architectural principles, able to process trillions of messages per day. What would it [...]

By |Middleware, monitoring|

Stirring Apache Kafka into the Middleware Mix (Part 1)

Stirring Apache Kafka into the Middleware Mix (First of a six-part blog series that describes how a team of IT pros and managers at one of the world’s largest global banks accommodated a bank acquisition and mastered a complex hybrid messaging environment spanning mainframes, distributed systems, and clouds.) About the Author Charley Rich has decades [...]