Tag: APM

The secret to exploiting your investment in messaging middleware!

The secret to exploiting your investment in messaging middleware!

Messaging Middleware – Large enterprises generally expend about ¼ of their entire IT budget on the systems and processes to connect the disparate systems that make up complex application stacks.

Nastel announces the immediate availability of Nastel Navigator X

Nastel announces the immediate availability of Nastel Navigator X

The only Product that combines Administration, Secure Self Service,Proactive Monitoring and Message Tracking for all Middleware in one Category Making Solution!  Nastel Technologies, the global leader of solutions covering middleware centric end-to-end Transaction Tracking and Application Performance Management (APM) for mission-critical applications across all environments, has announced today the immediate availability of Nastel Navigator X.…
Read more

Performance Monitoring in the Cloud Age

Performance Monitoring in the Cloud Age

Cloud – Business applications have continued to become more complex, and the tools we all rely on to monitor performance have not always kept up.

A Really Big Blog Part 2!

A Really Big Blog Part 2!

After reading Richard’s blog about large balloons in India, I felt the need to explore this topic a little further. A few years back I was on a business trip to Bangalore, and one night while in my hotel room reading the paper copy of the Bangalore times (a free paper left in my hotel…
Read more

A Really Big Blog!

A Really Big Blog!

On my first trip to India I stayed right across from the gateway of India. This is a tourist area, especially popular for the locals, and some international travelers.  From my hotel window, I could see street vendors with these really big balloons. They were probably 6 feet in length. Later that day I decided…
Read more

Using the experience of APM experts in the age of COVID-19

Using the experience of APM experts in the age of COVID-19

The world is waking up to the importance of tracing and tracking techniques, something experienced operations staff have used for decades. In IT terms the idea of following the pathway (the act of tracing) that a user takes through a complex business system is the cornerstone of the analysis that is performed by security and…
Read more

Nastel announces the general availability of Nastel Navigator 10

Nastel announces the general availability of Nastel Navigator 10

Nastel Technologies announces the general availability of Nastel Navigator 10, which includes new features for enterprise customers. Nastel Technologies™, a premier global provider of Messaging Middleware Centric solutions covering end-to-end Transaction Tracking and Application Performance Management (APM) for mission-critical applications in mixed cloud environments, announced today the general availability of Nastel Navigator™ release 10. Nastel…
Read more

tools

What if you could predict and repair a problem before it happened?

Imagine being able to report to your boss that your response times to a problem were hours or even days before the problem occurred. That your time to repair was actually negative!

U.S. Coast Guard Issues Alert After Ship Heading Into Port Of New York Hit By Cybersecurity attack

U.S. Coast Guard Issues Alert After Ship Heading Into Port Of New York Hit By Cybersecurity attack

The U.S. Coast Guard has issued an official warning to owners of ships that cybersecurity at sea needs updating, and updating urgently. In the Marine Safety Alert published June 8, the Coast Guard “strongly encourages” that cybersecurity assessments are conducted to “better understand the extent of their cyber vulnerabilities.” This follows an interagency investigation, led by the…
Read more

The dirty dozen: 12 top cloud security threats

Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads. It has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public in particular—these resources become natural targets for bad actors. “The volume of public cloud utilization is growing…
Read more