HP's Michel Feaster: Why automation is needed
Automation is where hardware and software meet in the enterprise, says HP - and you can remove major IT headaches by making it easier to deal with changes in both.
The unintended consequence of Web 2.0 is that it means that the endpoint now matters much more. Historically people have monitored and managed the data centre and there has been much less focus about always monitoring the client or the endpoint and understanding the end to end response times. In a Web 2.0 application, those clients are not only rich but they talk very interactively to the application. It changes the network because the conversations that are happening across the network are different and it changes the behaviour of the desktop. It's a client server application masquerading as the Web.
Managing the end-to-end process, including the client, is very strategic. You want to marry infrastructure monitoring and application and user monitoring. Like automating from a service perspective, let's monitor from a service perspective.
We have the capability to have remote agents running business transactions from places around the world, we have the ability to do business transaction management, to do transaction breakdown and trace an application through the system and say hey it's Tibco, that's what slow' or it's this router'.
What we've seen historically is that people had great systems data; the server is up - but no-one can use the application. We acquired Bristol to do that transaction tracing because that was the missing piece. Now can say hey the systems are up, but Michel's app is really slow and not only that, there's a thousand people logging in from London and everybody's experience is slow -what's wrong?' Is it just London? Is it a network device? Is it some messaging rule that was changed in Tibco so I'm going to a Siteminder authentication that is in a little tiny box that doesn't perform... That has proved to be a killer combination for us.
In This Article
Application security fallacies and realities
Web application attacks are the most common vulnerability, so what is the truth about application security?Download now
Your first step researching Managed File Transfer
Advice and expertise on researching the right MFT solution for your businessDownload now
The KPIs you should be measuring
How MSPs can measure performance and evaluate their relationships with clientsDownload now
Life in the digital workspace
A guide to technology and the changing concept of workspaceDownload now