HP's Michel Feaster: Why automation is needed
Automation is where hardware and software meet in the enterprise, says HP - and you can remove major IT headaches by making it easier to deal with changes in both.
The unintended consequence of Web 2.0 is that it means that the endpoint now matters much more. Historically people have monitored and managed the data centre and there has been much less focus about always monitoring the client or the endpoint and understanding the end to end response times. In a Web 2.0 application, those clients are not only rich but they talk very interactively to the application. It changes the network because the conversations that are happening across the network are different and it changes the behaviour of the desktop. It's a client server application masquerading as the Web.
Managing the end-to-end process, including the client, is very strategic. You want to marry infrastructure monitoring and application and user monitoring. Like automating from a service perspective, let's monitor from a service perspective.
We have the capability to have remote agents running business transactions from places around the world, we have the ability to do business transaction management, to do transaction breakdown and trace an application through the system and say hey it's Tibco, that's what slow' or it's this router'.
What we've seen historically is that people had great systems data; the server is up - but no-one can use the application. We acquired Bristol to do that transaction tracing because that was the missing piece. Now can say hey the systems are up, but Michel's app is really slow and not only that, there's a thousand people logging in from London and everybody's experience is slow -what's wrong?' Is it just London? Is it a network device? Is it some messaging rule that was changed in Tibco so I'm going to a Siteminder authentication that is in a little tiny box that doesn't perform... That has proved to be a killer combination for us.
In This Article
BIOS security: The next frontier for endpoint protection
Today’s threats upend traditional security measuresDownload now
The role of modern storage in a multi-cloud future
Research exploring the impact of modern storage in defining cloud successDownload now
Enterprise data protection: A four-step plan
An interactive buyers’ guide and checklistDownload now
The total economic impact of Adobe Sign
Cost savings and business benefits enabled by Adobe SignDownload now