What You Should Be Monitoring to Ensure Digital Performance - Part 2
October 30, 2018
Share this

APMdigest asked experts from across the IT industry for their opinions on what IT departments should be monitoring to ensure digital performance. Part 2 covers key performance metrics like availability and response time.

Start with What You Should Be Monitoring to Ensure Digital Performance - Part 1

AVAILABILITY

To ensure digital performance, availability is one of three key performance areas I always recommend monitoring. Your applications and networks must first be available to service users and customers. Otherwise, they're useful to no one.
Jean Tunis
Senior Consultant and Founder of RootPerformance

Monitoring the login page of an application with a synthetic transaction is an essential part of an Enterprise Monitoring strategy. Active monitoring is a good starting point to provide visibility on application availability especially when monitoring outside the Data Center. Synthetic Transactions can provide location-based availability and act as a barometer for measuring application performance.
Larry Dragich
Technology Executive and Founder of the APM Strategies Group on LinkedIn.

Read Larry Dragich's latest blog: Digital Intelligence - Why Traditional APM Tools Aren't Sufficient

Read Larry Dragich's new white paper: The Case for Converged Application & Infrastructure Performance Monitoring

INFRASTRUCTURE RISK

Understanding Infrastructure Risk is a key component of monitoring that most organizations miss. APM tools do a great job of tracking left-to-right performance across an application, and modern application designs ensure that no single component can cause a failure. Building an understanding of the risk inherent in the current IT infrastructure — below the application — is critical for stopping unexpected downtime and sudden capacity limits. You can do that by tracking links from between overlay and underlay networks, file systems to storage units, and hypervisor to server hardware — or you can use a unified monitoring tool do do it for you. Key buying decision — can you see the IT infrastructure risk for the specific components that your application relies on?
Kent Erickson
Alliance Strategist, Zenoss

THROUGHPUT

To ensure digital performance, throughput is one of three key performance areas that must be included. Applications and networks must be able to provide all the relevant data that is required to fulfill a specific request. Monitoring throughput ensures you know when your systems do not deliver all of the data that was requested, and you can act on it before the complaints come in.
Jean Tunis
Senior Consultant and Founder of RootPerformance

PAGE LOAD SPEED

Ultimately you want to be monitoring everything that impacts customer experience and conversion rates, but the most important thing is the page load speed. This drives more conversions than any other factor. And the key pages are those at the beginning of a user journey since the more time someone has invested in the process the less likely they are to abandon.
Antony Edwards
CTO, Eggplant

RESPONSE TIME

To ensure digital performance, response time is one of three key performance areas that must not be forgotten. Requests for specific information from users must be fulfilled with as much speed as possible. This is a common expectation of every IT system, so you should be monitoring them.
Jean Tunis
Senior Consultant and Founder of RootPerformance

Monitor application response from user to application (last mile) and application to the data (middle mile) to not only measure is the app up but of it is working.
Jeanne Morain
Author and Strategist, iSpeak Cloud

TRANSACTION UPTIME

A good starting point is to implement end-to-end performance monitoring with real transaction uptime to complement your APM tools.
Sven Hammar
Founder and CSO, Apica

TIME TO FIRST BYTE

Initial motivation in the user journey can be lost very quickly if for example the first time the user clicks on an advertisement or logs into an application is not performant. The appearance of performance is important; monitoring time to first byte (TTFB)can help ascertain the experience of what a user sees marching towards a minimum viable/viewable product (MVP) of the page or app before being loaded to completion. TTFB is a leading indicator on web performance to the end user and also is used by the leading search engines in factoring in page rank as the more performant pages get a higher rank.
Ravi Lachhman
Evangelist, AppDynamics

LOG EVENTS

If it has an IP address, it sends logs, and logs must be monitored to gain detailed insight on server performance, security, error messages or underlying issues.
Clayton Dukes
CEO, LogZilla

Logs have been around since the dawn of computing, but with constantly increasing threats, logs are more important than ever. Log events are one of the key data sources SIEM (Security Information and Event Management) solutions use for threat detection.
Otis Gospodnetić
Founder, Sematext

Read What You Should Be Monitoring to Ensure Digital Performance - Part 3, covering the development side.

Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...