Your applications should ensure end-user satisfaction and boost productivity for employees and partners. Therefore, IT pros implementing or monitoring applications should take the time to understand how end-users interact with their application, share the proper amount of information with the right stakeholders, implement the right workflows and ensure they are performing top-notch.
Here are 10 quick tips to help you get started.
Tip 1: Prioritize which applications should be monitored first
With a growing number of employees bypassing IT and going rogue to the cloud, it's anarchy out there. Plus counting legacy applications, Citrix and Terminal server hosted apps, CRM, EHR, custom-built applications, accounting, invoicing, HR, email and collaboration tools, the list of applications your employees, partners or customers rely on (and you support) is long.
Your applications fuel your business, so they must consistently perform well, and ultra-fast. Since you have to start somewhere, identify those critical applications that must perform well in order to run your business (e.g. applications migrated to the cloud, CRM, ERP, EHR systems), and monitor them first. You know better than anybody else what is critical to your business and users.
Tip 2: Identify critical transactions to monitor
Put on your "think from an end-user perspective hat" and map out common functions used by your power users (e.g. those using your applications the most, those driving the most revenue, upper management, etc.). Or better yet, schedule a meeting with your business counterparts, management and stakeholders to identify critical functionality from their perspective.
If you recently went through the process of implementing a new application, you should have your workflows already mapped, right? As you document critical transaction paths or workflows for your application users, this is a great time to fine tune your processes and minimize the number of steps needed for common functions.
Tip 3: Proactively monitor your applications from an end-user perspective
End-users are more impatient than ever before. Therefore, you should continuously monitor each one of these critical transactions (or workflows) from a user perspective, taking response time measurements for each step to ensure user SLAs are met.
It is unacceptable that in 35% of cases IT learns that there is an issue when a user opens a helpdesk ticket or calls to complain (Source: Forrester Research). Change the game and get ahead; find and resolve bottlenecks, errors and constraints, problems before your users are impacted.
Tip 4: Decide polling frequencies and alerting policies
A good rule of thumb is to monitor key transactions more frequently (e.g. being able to send a sales proposal is more critical than reporting on sales pipeline, or being able to sell online is more important that reading a product review) to identify performance degradation signs earlier.
Take the time to define who should be alerted in the event of specific threshold violations, and configure the number of response time violations that will trigger an alert to eliminate false positives and alert storms.
Don't forget to look for key monitoring functionality like scheduling monitoring tests or disable alerting on scheduled maintenance periods or when you are on vacation. You should be in control of your monitoring.
Tip 5: Identify geographical response time discrepancies early on
Employees at remote offices could experience slower response times than those accessing your applications from headquarters; legacy applications could underperform for some offices or branches. Get ahead of user complaints. The faster way to find and resolve problems like this is to monitor and compare availability and response time of your applications across multiple monitoring locations (Headquarters, Boston, NYC, remote office locations, etc.).
Tip 6: Define your custom reports
Since different metrics are important for different stakeholders, take the time to map out role-based reports with custom information for each team (per application, per transaction, per functionality, etc.), and automatically distribute reports on an on-going basis (daily, weekly or monthly basis) to keep everybody informed and aligned.
Tip 7: Centralize IT response procedures and workflow
From legacy applications, to client server applications, to web applications, to home-grown custom applications, cloud-based or green screen apps, most large enterprises have a complex portfolio with 250-500 applications to support. The cost of purchasing, configuring and maintaining several monitoring products to support individual applications is too high.
Plus lack of integration across monitoring consoles results in islands of uncorrelated information which leads to wrong conclusions, hinders troubleshooting and increases Mean-Time-To-Resolution (MTTR).
Instead, look for one solution that lets you test and monitor all applications, so you can quickly identify problem root cause.
Tip 8: Keep everybody in the loop
In a new era where end-user satisfaction rules, you need to continuously validate and demonstrate your SLAs, so go ahead and periodically share your SLA reports with your users and stakeholders. Provide a quick summary dashboard with a drill-in so that they don't have to peruse voluminous reports.
Plus since user satisfaction is the ultimate measurement of IT success (your success), this is the best metric to promote the value that IT provides to your organization.
Tip 9: Review results on an on-going basis
Do you need to fine-tune? Do you need to optimize application performance? With a metric-driven strategy in place you can keep all stakeholders in the know, and take informed business decisions that directly impact your bottom line (e.g. quickly ascertain if you need to focus on performance optimization or not, change cloud providers, etc.).
Tip 10: Ensure quality
Build a culture where application quality is not an afterthought. You should include testing (functional testing, regression testing, performance testing, load testing) in all application development/application implementation cycles right from the beginning to ensure quality. Being able to reuse your test scripts for production monitoring will also help streamline your processes.
In summary, your end-users have the last word on whether they are satisfied with the speed, availability and performance of your applications, so implement, test and monitor your applications from your end-users' perspective.
And don't forget your mobile users. Smart devices are not only competing for PCs' place in your users' lives, or in the enterprise – they are replacing the experience. In fact, the amount of time users spend browsing the Web on their mobile devices is trouncing desktops (Source: The Wall Street Journal). And mobile user expectations are on par with, if not higher than, their desktop counterparts. Therefore, look for SLA application monitoring for both mobile and desktop users. Good luck!
Jay Labadini is a VP and Co-Founder of Tevron.
In today's competitive landscape, businesses must have the ability and process in place to face new challenges and find ways to successfully tackle them in a proactive manner. For years, this has been placed on the shoulders of DevOps teams within IT departments. But, as automation takes over manual intervention to increase speed and efficiency, these teams are facing what we know as IT digitization. How has this changed the way companies function over the years, and what do we have to look forward to in the coming years? ...
Although the vast majority of IT organizations have implemented a broad variety of systems and tools to modernize, simplify and streamline data center operations, many are still burdened by inefficiencies, security risks and performance gaps in their IT infrastructure as well as the excessive time it takes to manage legacy infrastructure, according to the State of IT Transformation, a report from Datrium ...
When it comes to network visibility, there are a lot of discussions about packet broker technology and the various features these solutions provide to network architects and IT managers. Packet brokers allow organizations to aggregate the data required for a variety of monitoring solutions including network performance monitoring and diagnostic (NPMD) platforms and unified threat management (UTM) appliances. But, when it comes to ensuring these solutions provide the insights required by NetOps and security teams, IT can spend an exorbitant amount of time dealing with issues around adds, moves and changes. This can have a dramatic impact on budgets and tool availability. Why does this happen? ...
Data may be pouring into enterprises but IT professionals still find most of it stuck in siloed departments and weeks away from being able to drive any valued action. Coupled with the ongoing concerns over security responsiveness, IT teams have to push aside other important performance-oriented data in order to ensure security data, at least, gets prominent attention. A new survey by Ivanti shows the disconnect between enterprise departments struggling to improve operations like automation while being challenged with a siloed structure and a data onslaught ...
A subtle, deliberate shift has occurred within the software industry which, at present, only the most innovative organizations have seized upon for competitive advantage. Although primarily driven by Artificial Intelligence (AI), this transformation strikes at the core of the most pervasive IT resources including cloud computing and predictive analytics ...
When asked who is mandated with developing and delivering their organization's digital competencies, 51% of respondents say their IT departments have a leadership role. The critical question is whether IT departments are prepared to take on a leadership role in which collaborating with other functions and disseminating knowledge and digital performance data are requirements ...
The Economist Intelligence Unit just released a new study commissioned by Riverbed that explores nine digital competencies that help organizations improve their digital performance and, ultimately, achieve their objectives. Here's a brief summary of 7 key research findings you'll find covered in detail in the report ...
Today, the overall customer scenario has digitally transformed and practically there is no limitation to the ways in which the target customers can be reached. These opportunities are throwing multiple challenges for brands and enterprises, and one of the prominent ones is to ensure Omni Channel experience for customers ...
Most businesses (92 percent of respondents) see the potential value of data and 36 percent are already monetizing their data, according to the Global Data Protection Index from Dell EMC. While this acknowledgement is positive, however, most respondents are struggling to properly protect their data ...
IT practitioners are still in experimentation mode with artificial intelligence in many cases, and still have concerns about how credible the technology can be. A recent study from OpsRamp targeted these IT managers who have implemented AIOps, and among other data, reports on the primary concerns of this new approach to operations management ...