Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Pat Romanski

Related Topics: @DevOpsSummit, Java IoT, Agile Computing

@DevOpsSummit: Blog Post

Slow Applications Are Criminal | @DevOpsSummit #APM #IoT #DevOps #Docker #Microservices

The Witness, The Watchman, and The Agent

In the world of Application Performance Management (APM) it is always better to enlist more than one entity to help solve the mystery of performance problems.

It's kind of like arriving at the scene of the crime on foreign soil, being blindfolded, shoved out the door, and then asked to help solve the injustice without any insight.  All you can do is begin by asking people in the vicinity, providing you speak their language, for information on what they have seen (i.e. end-user-experience).

Gathering facts related to a crime is essential, and can be likened to utilizing an APM solution for solving application performance problems. The more information about an application's behavior that you can obtain, along with understanding its idiosyncrasies within the environment, the more likely you will be able to pinpoint root causes of performance issues.

The Three People You Need
Wouldn't it be helpful if there was an eye-witness you could interview, a watchman who was on duty during the time of the incident, and an agent you could hire to translate the native tongue and provide insight into the culture?

In much the same way a smart APM strategy enlists the help from these three entities: the Witness, the Watchman, and the Agent.  You start by listening to the testimony from the eye-witness (aka. wire data), collecting the observations from the watchman (aka web robots), and analyzing details from the agent (aka code level instrumentation).

The Witness -
[Passive monitoring - wire-data analytics]

The Witness reports what they see within their field of vision, (aka. passive monitoring, wire-data analytics).  The Witness is watching everything in their purview and sees things as they happen, which corresponds to what is coming across "the wire," in front of them.

The Witness will tell you how many people were involved, if anyone was injured, and what time the event occurred, (e.g. user names, packet loss, timelines, etc.).  She can tell you what doors the people went through, how wide the aisles were, and how fast people were traveling, (e.g., network port listeners, realized bandwidth, round-trip-time, etc.).

The Watchman -
[Active monitoring - synthetic transactions]

The Watchman (aka. web robot) is actively checking and is always on patrol, methodically taking the same path every time.  He will tell you what doors are locked and monitor the ones that are open, collecting measurements along the way on how long it takes to complete his rounds, (i.e. synthetic transactions).

The Watchman will report the status of the rooms and buildings on his patrol and will note if anything happens to him along the way, (e.g. application availability, transaction errors, timeouts, etc.).

The Agent -
[Application code instrumentation]

The Agent you hire is critical for solving the crime within the territory you're operating in.  The Agent will watch activity from specific vantage points throughout the environment and report back his findings.  It's crucial he speaks the local language, (e.g. Java, .Net, PHP) and can easily translate for you.

His approach will be to deploy probes on rooftops and inside the buildings for monitoring all conversations and actions in the environment, (aka. application code instrumentation). He will also tap the communication systems, (i.e. script injection) when appropriate and capture specific measurements from each conversation and record them.

Going from Red to Green
Identifying an application that has gone catatonic is one thing, but assessing the insidious slow performance of a complex multi-tiered application and fixing it, can be very time consuming and costly. Enlisting all three entities described above to assist is a thoughtful strategy for any IT Leader to consider.

To read the full article on the Pulse click here: Slow Application Are Criminal

More Stories By Larry Dragich

Larry Dragich is actively involved with industry leaders, sharing knowledge of Application Performance Management (APM) technologies, from best practices and technical workflows, to resource allocation and approaches for implementation. He has been working in the APM space since 2006 where he built the Enterprise Systems Management team which is now the focal point for IT performance monitoring and capacity planning activities.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...