Here are some important guidelines to remember when you start to plan your mobile monitoring strategy ...
1. Real device monitoring is a "must"
Only real devices let you capture the true mobile end user experience in terms of application performance and availability. Be sure to use non-jailbroken/rooted devices, production version apps (non-modified), run complex user scenarios using complex client logic on real devices, and measure client-side performance impact on the overall user experience. Other monitoring solutions, such as browser emulation, fail to reflect the true mobile user experience.
2. Leverage both RUM and Synthetic monitoring techniques
Real User Monitoring is the best way to know what is happening on a user's device, as it is based on an agent within the application that collects data and communicates it to the monitoring server. Synthetic monitoring allows organizations to track application behavior against real networks globally in a “clean-room” environment, and provides an excellent solution for debugging problems identified in the field.
3. Extend your existing monitoring solution to mobile
There is no need to re-invent the wheel. Your operations center has accumulated valuable experience in monitoring and triaging incidents. There is no need to create new processes, re-train personnel or buy completely new solutions. Rather, it is advisable to expand those processes to cover your mobile initiative as well by making it mobile-relevant.
4. Select your synthetic monitoring coverage wisely
Synthetic monitoring, by definition, provides sampled coverage of the audience, devices, carriers and locations, and user scenarios. It is not realistic to provide coverage for everything. Identify those combinations that are relevant to your business objectives and work from there.
5. Ensure the reliability of your monitoring solution to eliminate false alerts
There is nothing most frustrating to your Ops Center staff than false alerts. Your mobile monitoring solution must comply with stringent SLAs to ensure that your engineers do not waste time on alerts caused by problems related to device availability, for example. Device redundancy, together with identification and reduction of alerts driven from known issues, help to ensure proper attention to real issues that are impacting end users.
The Latest
A long-running study of DevOps practices ... suggests that any historical gains in MTTR reduction have now plateaued. For years now, the time it takes to restore services has stayed about the same: less than a day for high performers but up to a week for middle-tier teams and up to a month for laggards. The fact that progress is flat despite big investments in people, tools and automation is a cause for concern ...
Companies implementing observability benefit from increased operational efficiency, faster innovation, and better business outcomes overall, according to 2023 IT Trends Report: Lessons From Observability Leaders, a report from SolarWinds ...
Customer loyalty is changing as retailers get increasingly competitive. More than 75% of consumers say they would end business with a company after a single bad customer experience. This means that just one price discrepancy, inventory mishap or checkout issue in a physical or digital store, could have customers running out to the next store that can provide them with better service. Retailers must be able to predict business outages in advance, and act proactively before an incident occurs, impacting customer experience ...
Earlier this year, New Relic conducted a study on observability ... The 2023 Observability Forecast reveals observability's impact on the lives of technical professionals and businesses' bottom lines. Here are 10 key takeaways from the forecast ...
Only 33% of executives are "very confident" in their ability to operate in a public cloud environment, according to the 2023 State of CloudOps report from NetApp. This represents an increase from 2022 when only 21% reported feeling very confident ...
The majority of organizations across Australia and New Zealand (A/NZ) breached over the last year had personally identifiable information (PII) compromised, but most have not yet modified their data management policies, according to the Cybersecurity and PII Report from ManageEngine ...
A large majority of organizations employ more than one cloud automation solution, and this practice creates significant challenges that are resulting in delays and added costs for businesses, according to Why companies lose efficiency and compliance with cloud automation solutions from Broadcom ...