Digital Transformation Needs Intentionality
June 05, 2018

Larry Dragich
Technology Executive

Share this

With the convergence of technology finding its way from the corporate world to our personal devices and home appliances, meeting the expectations of a quality customer experience is a formidable challenge.

Digital Transformation seems to be on everyone's radar but if there is no intentionality from the IT Executive who is sponsoring the program it becomes more of a loose correlation of technology initiatives under an IT strategy banner.

Consider some of the initiatives: Data/Analytics, Mobile Technology, Private Cloud, Artificial Intelligence (AI), Machine Learning, and the Internet of Things (IoT). All have their own unique role to play that is intrinsic to a Digital Transformation program. Although, when you step back and consider how to measure the success for such a program, things can get a little murky.

Digital Transformation requires more than just the latest technology, it's a mindset that iterative change is on the way and should be embraced. This also requires us to factor in the people and process parts of the equation and find ways to measure the end-user-experience (EUE).

One way to do this is to sponsor an Application Performance Monitoring (APM) initiative that can provide visibility to the business, help communicate the progress, and highlight the impacts to the organization.

Meaningful metrics can be difficult to obtain without a specific focus on business impact (transactions) and a concise way to collect them. Consider that a strong APM solution opens the door for better clarity on how each technology initiative affects the EUE, providing key metrics for a Digital Transformation program.

I recommend including all three monitoring factions within an APM strategy, Wire Data Analytics, Synthetic Transactions, and Agent Code Instrumentation.

1. Wire Data Analytics- Discover and decipher application performance data as it traverses the network.

2. Synthetic Transactions- Web robots that execute specific transactions for location-based availability and act as a barometer for measuring application performance.

3. Agent Code Instrumentation- Lightweight agents monitoring the application code as it executes from the Web and App servers. To gain visibility at the edge, script injection is often used for client render time.

Utilizing these overarching delivery mechanisms to provide input into a Machine Learning and/or AI solution has the potential to dramatically improve application delivery and performance across a variety of IT disciplines. This also lays the ground work to support a DevOps culture, providing an amplified feedback loop that is so desperately needed.

Once you develop a strategy on the best way to bring together the 3 monitoring factions, APM becomes "table stakes" on the digital transformation front because you can't improve what you don't measure.

Larry Dragich is a Technology Executive and Founder of the APM Strategies Group on LinkedIn
Share this

The Latest

September 12, 2019

Multichannel marketers report that mobile-friendly websites have emerged as a dominant engagement channel for their brands, according to Gartner. However, Gartner research has found that too many organizations build their mobile websites without accurate knowledge about, or regard for, their customer's mobile preferences ...

September 11, 2019

Do you get excited when you discover a new service from one of the top three public clouds or a new public cloud provider? I do. But every time you feel excited about new cloud offerings, you should also feel a twinge of fear. Because in the tech world, each time we introduce something new we also add a new point of failure for our application and potentially a service we are stuck with. This is why thinking about the long-tail cloud for your organization is important ...

September 10, 2019

A solid start to migration can be approached three ways — all of which are ladder up to adopting a Software Intelligence strategy ...

September 09, 2019

Many aren't doing the due diligence needed to properly assess and facilitate a move of applications to the cloud. This is according to the recent 2019 Cloud Migration Report which revealed half of IT leaders at banks, insurance and telecommunications companies do not conduct adequate risk assessments prior to moving apps over to the cloud. Essentially, they are going in blind and expecting everything to turn out ok. Spoiler alert: It doesn't ...

September 05, 2019

Research conducted by Aite Group uncovered more than 80 global eCommerce sites that were actively being compromised by Magecart groups, according to a new report, In Plain Sight II: On the Trail of Magecart ...

September 04, 2019

In this blog, I'd like to expand beyond the TAP and look at the role Packet Brokers play in an organization's visibility architecture. Here are 5 common mistakes that are made when deploying Packet Brokers, and how to avoid them ...

August 29, 2019

Over the last several years, EMA research found that enterprises are actively expanding their use of network automation tools.To understand these automation projects more fully, EMA has completed a new study, titled "Enterprise Network Automation for 2020 and Beyond" ...

August 28, 2019

Data modernization and cloud migration are reaching a tipping point among large and medium-sized businesses as many companies double their data footprints once or twice a year, according to a new Deloitte survey ...

August 27, 2019

Digital transformation is a journey, not a destination. Your enterprise needs the right insights to drive a continuous process that can create positive user experiences and improved efficiencies before, during, and after the implementation of SAP S/4HANA ...

August 26, 2019

The widespread, ongoing adoption of innovative technologies related to SD-WAN, cloud services, 5G, etc. means that today's networks are in a constant state of flux. Although these technologies offer tremendous business benefits, they can also add tremendous complexity as well, creating major obstacles that prevent network agility ...