Using AIOps

AIOps (Artificial Intelligence for IT Operations) is the “marketing term” that refers to the techniques and ideas associated with using machine learning based artificial intelligence to analyze machine data to automate the identification and resolution of common information technology (IT) issues.  AIOps offers IT some truly impressive improvements. There are three key benefits to [...]

Security Tips for the Season

Illegal activity has progressed to the digital world, at the speed of e-business. Today it may well be the biggest industry sector out there. Stealing personal information and selling this on illicit dark websites is big business, as is creating and selling techniques to phish, deliver illicit payloads, and of course creating the illicit payloads [...]

Operational Data Provides a New Dimension to Security

Those who wish to harm your business are the proverbial needle in a haystack, and it’s been much easier to be the needle and hide than to be those hunting through the hay. Being small in a large environment makes it much easier to be sneaky. But there are some complex indicators of intrusion that [...]

Improving APM

We all know that when you add lanes to a highway, the improvement in journey time is short lived, as more vehicles start to use the new road, creating more traffic, there are then more chances for accidents and this results in slower journey times. The same seems to happen with technology, Moore's law is the [...]

How long will your users wait?

As businesses transition to embrace cloud services, application solutions are becoming significantly more complex and federated. Every additional component stitched to the core application can potentially introduce unforeseen nuances that can lead to unexpected events that cause issues. The basic relationship between any components you add to a process is geometric. Simply speaking, every component [...]

Can Good Ideas Survive Your Experts Scrutiny?

The history of computing can be described as waves. The first waves were purely of invention of basic ideas, where cogs gave way to vacuum tubes which gave way to transistors, and magnetic core memory gave way to dynamic RAM. The next waves created scale, where individual components gave way to integrated circuits and silicon [...]

Solving the Monitoring Problems of This Decade and the Next

There is a difference between monitoring technology and understanding the impact of technology on your business. One of the most stressful times for any online business is dealing with performance and availability issues that were reported by your customers. If the customer saw an issue and reported it, things are bad, the clock is ticking, [...]

Solving the application performance growth gap.

Business applications continually become more complex as we have found ever more elegant ways to describe the logic behind process and automate the delivery of this logic. This seems obvious when you see (for example) the manual steps in business be replaced by web-based applications. Where we used to hand write sign credit card slips [...]

Applying Bayes Theorem to a Big Data World

Bayes Theorem One of the challenges in analyzing Big Data is of course its volume - there is just so much of it. Then mix in high velocity, or Fast Data and standard analytical methodologies to make sense of it breakdown, and become cumbersome and ineffective. Machine learning techniques that self-adjust and improve over time [...]

Why Classic Monitoring Is Not Enough

"Round up the usual suspects." Monitoring your IT systems continues to be a critical part of ensuring that your business runs. But is it enough? With the continually increasing complexity of IT systems, many businesses struggle to ensure that everything continues to operate at levels that the customers demand. Monitoring systems generally track some or [...]