HP's Michel Feaster: Why automation is needed

Automation is where hardware and software meet in the enterprise, says HP - and you can remove major IT headaches by making it easier to deal with changes in both.

The unintended consequence of Web 2.0 is that it means that the endpoint now matters much more. Historically people have monitored and managed the data centre and there has been much less focus about always monitoring the client or the endpoint and understanding the end to end response times. In a Web 2.0 application, those clients are not only rich but they talk very interactively to the application. It changes the network because the conversations that are happening across the network are different and it changes the behaviour of the desktop. It's a client server application masquerading as the Web.

Managing the end-to-end process, including the client, is very strategic. You want to marry infrastructure monitoring and application and user monitoring. Like automating from a service perspective, let's monitor from a service perspective.

We have the capability to have remote agents running business transactions from places around the world, we have the ability to do business transaction management, to do transaction breakdown and trace an application through the system and say hey it's Tibco, that's what slow' or it's this router'.

What we've seen historically is that people had great systems data; the server is up - but no-one can use the application. We acquired Bristol to do that transaction tracing because that was the missing piece. Now can say hey the systems are up, but Michel's app is really slow and not only that, there's a thousand people logging in from London and everybody's experience is slow -what's wrong?' Is it just London? Is it a network device? Is it some messaging rule that was changed in Tibco so I'm going to a Siteminder authentication that is in a little tiny box that doesn't perform... That has proved to be a killer combination for us.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/business-strategy/it-infrastructure/354188/tsb-payment-delays-suggest-second-it-meltdown
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019