Taking APM to an "EPIC" Level
March 06, 2015

Kieran Taylor
CA Technologies

In an age of big data, more must mean better, right? Scan the APM marketplace and you’d think that there are legions of data nerds eager to swim in data, painstakingly applying their tightly guarded expertise to reduce their MTTI (mean time to innocence). The reality is that no one in IT has the time. It’s answers, not data that’s paramount.

How did we get to this state of data bloat? The biggest cause is not fully understanding the real-world users of application monitoring. Just as IT managers know that great APM starts with the end user experience, vendor product design must start with those IT users in mind. Sounds obvious, yes, but it’s too easy to fall into a vicious circle of capturing and reporting every metric with the assumption a human is eager to own the forensics.

As discussed in a previous blog, selecting the right APM for DevOps is an “EPIC” decision. Easy, Proactive, Intelligent, and Collaborative is a user-driven approach to APM focused squarely on helping ITOps teams succeed at managing application performance.

To build an E.P.I.C. APM solution, requires not only a clinical understanding of the most common needs by role type, but also working with real users; understanding a day in their lives and truly empathizing with their challenges. How do you make the clickpath to answers truly intuitive? What’s the preferred way to easily share insights with colleagues? Answers to these and other questions means really spending a day in the life with many different roles such as application developer, APM administrator, level 1 support analyst, production support analyst, middleware specialists, test engineers, production performance engineers and more.

The developers of an E.P.I.C. APM solution must understand the stories behind each of the roles and at a very practical level, what steps and methods they enact for success. And here’s the kicker: to create an APM solution that its users are passionate about, you must be passionate about them. So, in addition to having deep day in the life insights, the developers of an E.P.I.C. APM solution must truly empathize with and care about the success of each role.

Here are some examples of how E.P.I.C. APM delivers on its passion for APM users:

Easy

Making APM easy to adopt, fast time-to-value, simple-to-use, easy to manage and configure. For example, simplify management for thousands of agents with a central repository of all agent configurations and meta-data across all of your APM clusters in minutes and not hours.

Proactive

In agile environments the concept of “canary-testing” new code (against unsuspecting) users has grown in popularity to gain early detection and prevent bigger issues during the full push of a revision. Proactive approaches to APM ensure that insights are gathered quickly and shared with development, versus the ‘wait and see’ tactic.

Intelligent

Collecting and delivering data is one thing, making it actionable is another. APM can be smarter. For example, automatically detecting degradation in one user’s experience and pinpointing the code or even infrastructure that is the cause. Instead of manually digging to get call stack visibility, transaction traces for that particular issue are surfaced automatically.

Collaborative

Enable better communication between Dev and Ops specialists to resolve problems faster by utilizing the same production tool in development, and with a unified view of the infrastructure and apps that affect business services. For example, operations providing real world data to development to make enhancements to apps more relevant and improve performance.

E.P.I.C. may sound like a clever marketing acronym but when we speak with the real front-line users of APM these are the areas that they care the most about. Designing for their unique needs is producing a new number of role-specific features that help convert big data into big answers.

Kieran Taylor is Sr Director, Product & Solutions Marketing, APM & DevOps, CA Technologies .

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this