The Essentials Series. Improving Application Performance Troubleshooting. sponsored by. by Don Jones
|
|
- Ashlyn Manning
- 8 years ago
- Views:
Transcription
1 The Essentials Series Improving Application Performance Troubleshooting sponsored by by
2 Article 1: Why Diagnosing Slow Applications Is Too Hard... 1 It Starts with a Help Desk Call... 1 And Quickly Involves the Entire Team... 2 Look, Guess, Fix, Repeat... 3 Modern Applications Are Complex Syste ms... 5 And Application Downtime C osts Money... 6 The Problem Is in Your Tools... 6 Article 2: Faster, More E fficient Application Troubleshooting... 7 Enable the Help Desk... 7 Enable a Focused, System-Wide Approach Find Tools for the Application, Not for Silos... 9 A Wish List for Application Management and Analysis... 9 Article 3: Becoming Proactive in Application Management and Monitoring Proactive Performance Troubleshooting? Monitoring the Entire Application, Not Just Components Techniques for Proactive Application Management and Monit oring Faster Application Problem Resolution; More Business Value i
3 Copyright Statement 2009 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers or its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. ii
4 Article 1: Why Diagnosing Slow Applications Is Too Hard Anyone working in any kind of business is familiar with this scenario: Users complaining that their applications have slowed down, managers getting tense that their employees aren t working, and the IT team running around trying to pinpoint the cause of the problem. In this Essentials Series, I ll share some of my own experiences in troubleshooting slow applications in a major enterprise, and try to unearth some of the reasons that troubleshooting seems to always be so slow and inefficient. But let s be clear about something: I m not discussing application performance management. APM is a huge IT discipline in and of itself, typically involving large, complex tool sets and very specialized skills. APM often involves measuring performance in somewhat unusual ways, such as running an agent on end user systems as well as on backend systems to measure the response times between the two. APM is certainly useful, but what s equally useful is being able to do something about applications that are experiencing some kind of performance setback. And perhaps more importantly, being able to do something quickly. Quickly is incredibly important. In a 2008 study entitled Service Level Management and Application Performance Management, Forrester Consulting found that only two thirds of application performance issues were resolved in what the business considered an acceptable time period. It Starts with a Help Desk Call Let s start by setting the stage, and looking at the first ways in which the troubleshooting process begins to bend toward massive inefficiency. Normally, you ll hear about a slow application directly from its users, often through your company s Help desk. If you re a fan of IT Service Management (ITSM) practices, this notification becomes an incident; in more generic terms, you might just call it a trouble ticket. But these incidents aren t as cut and dry as my computer blue screened or the printer isn t working; users are seldom able to be more specific than my application is suddenly running really slowly, or my application stopped responding. Ideally, your first tier support folks will try to verify the problem, and may be able to perform preliminary troubleshooting steps: Does the problem affect just a single user or are multiple users impacted? Does rebooting the user s client computer or closing and reopening the application help resolve the problem? Are other applications on the same computer affected? Is the problem limited to a single remote office or to a single department within the company? 1
5 Sadly, that s usually where the first tier team runs out of options. Unless an application or computer restart solves the problem, all the first tier can usually do is verify that the problem is occurring and perhaps try to define the scope of the problem. Because applications tend to be both complex and, in most cases, not specifically designed for performance troubleshooting, the first tier often has no choice but to toss the problem up the chain of command, and that s where the first major inefficiency kicks in: Who, exactly, should get notified of the problem? And Quickly Involves the Entire Team Your first tier support might initially notify a software developer, but the problem almost always escalates from there. Think about all the technology disciplines involved in a modern application: client application developers, component developers, database administrators, database developers, and more. In addition, applications rely on many different shared infrastructure elements, such as the network, domain name services, routers and switches, and more. So before long, an entire army of high end technical experts are examining the problem: developers, database administrators, network administrators, infrastructure administrators, and more. The More, the Merrier? I recall one troublesome application we had when I was working for a large telecommunications company in the US. One day, everyone seemed to think the application was running a bit slow, but we couldn t really pin down anything. By the end of the next week, the application was positively crawling, and managers throughout the company were screaming for support. Our Help desk was at a complete loss: They d actually gone above and beyond their normal responsibilities and scheduled server reboots, router reboots, and more, but nothing they did seemed to be helping. So they finally kicked the problem upstairs. We could have thrown a pretty good party with the number of people who became involved at that point: I was in charge of the network infrastructure, although I had specialists in charge of much of the infrastructure equipment, like our routers and switches. One of the software developers started looking at the application itself, and another started looking at its various subcomponents. Our Unix admin started examining the Unix based firewall and DNS services. A database administrator started poring over the SQL Server, while another developer started poking around the server side code within the database. One of our desktop support specialists started looking at the client computers to see if maybe there was some kind of resource conflict there. Our managers, of course, hovered over everything and got in the way. Nine or ten people, taken away from extremely important projects, all to fight a single fire. 2
6 Look, Guess, Fix, Repeat Everyo ne on the team starts looking at the slow application with their own particular tools: Network administrators might grab a packet analyzer and start looking at network traffic. Database administrators may turn to a profiling tool to look at database server performance. Software developers often have dedicated code performance tools (read more about those in The Definitive Guide to Building Code Quality from Realtime Publishers) that can profile application code performance. Desktop technicians may run client OS performance tools, such as Windows System Monitor or Performance Monitor. Infrastructure engineers might look at statistics collected within routers and switches. Technology managers usually don t have any specific tools but try to make lots of suggestions to everyone else anyway. Pay special attention to that list because you re looking at the exact reason why troubleshooting a slow application is so inefficient. I ll get to the specifics in a bit, but let s stick with the chronology and talk about what happens next: Someone takes a guess. Maybe the software developer has a tool, like the one shown in Figure 1, that breaks down application performance within the application s code. 3
7 Figure 1: Analyzing application code performance. The developer says, aha, this frmorderinquiry method is taking a long time and generating a lot of network activity this must be it. The developer makes some tweaks to the code, runs it through his performance tool again, and sees an improvement. I ve found the problem! he announces to the team. Everyone sighs in relief, the developer compiles a patch, and it s deployed to a few client computers (usually the ones with the users who ve been complaining the loudest). And then the bad news comes in: It didn t fix it. In my experience, the first guess at why the application is running slowly is wrong about 40% of the time. So the team groans, drops what they re doing, and jumps back on the problem. They drag out their tools and start looking at their own little domains until someone comes up with a better guess. 4
8 Modern Applications Are Complex Systems The root cause of this troubleshooting inefficiency is that modern applications are really, really complicated. Even seemingly simple applications can, in reality, be incredibly complex. Think about the average custom, in house application: It s built on some kind of framework perhaps.net, perhaps Java, perhaps something else and that framework will have its own internal performance characteristics. It s usually not a monolithic application but rather a collection of components. Some of those may be purchased and some may be developed in house. Some may even be open source, downloaded from the Internet. Each component may have its own performance issues. Applications run on a computer, which may well have its own performance problems: lack of memory, slow disks, failing network card, and so forth. Applications rely on a network that consists of its own complex infrastructure: routers, switches, hubs, wiring (which is susceptible to electrical interference), and so on. The network provides services that applications rely on, including DNS, which applications may use as a precursor to communicating with network based servers. Applications commonly communicate with one or more servers, which may have their own performance issues. Those servers run program code, too, which may feature any number of performance problems. Applications often utilize a database, which can have its own performance nightmares in addition to the performance problems of the server actually running the database software. And aside from all these individual components, you ve got the single complex entity called an application, which from a holistic viewpoint may exhibit what I call synergistic performance problems. In other words, sometimes a few well oiled components can conspire to create poor overall performance. You can t point to any one component as the cause of slow performance, but taken together, the various components do, in fact, run slowly. Many of these components may only run slowly some of the time, which makes troubleshooting even more difficult problems that can t be repeated consistently are much more difficult to solve. 5
9 And Application Downtime Costs Money When applications are running slowly, users aren t productive. In one of my past jobs, we estimated that each hour of application downtime cost us $45,000 in lost productivity, diverted technical expertise, and more. On average, my application is running slowly would take 48 hours to finally resolve, costing the company $360,000. That s just an average, though I remember one problem that took us over a month to finally sort out a theoretical cost of millions of dollars. Ouch. Note In their study, Forrester found that 43% of businesses estimated downtime costing at least $10,000 per hour, and 10% cited more than $1 million. Research from Enterprise Management Associates suggests that an industry average of $45,000 per hour is accurate, although they say it is higher for transaction intensive verticals such as financial services, where the cost can exceed millions per minute. The point is that time is money, and you can t afford to keep doing the look, guess, fix, repeat cycle. You need to be able to look and to fix definitively, without the guessing and repeating. So why is it so difficult? The Problem Is in Your Tools The problem is that first bullet list I showed you: All those IT experts using their individual domain tools. None of them was troubleshooting the application: They were troubleshooting individual bits of it. Sure, eventually one of them will stumble across the answer, but it s horribly inefficient. When you hear a loud, annoying sound in your house, you don t immediately call in a plumber, HVAC technician, structural engineer, and an exterminator. You take a few minutes to try to narrow down the problem. You listen to the house as a whole, turn the taps on and off, shut the HVAC down, and so forth. When you ve narrowed the problem a bit, you call the one specialist that can handle that problem. That s how you should be able to deal with a slow application: The Help desk your first tier of support for the incident should be able to direct the problem to the one technology expert who can actually fix it. 6
10 Article 2: Faster, More Efficient Application Troubleshooting So how do we resolve application performance problems more quickly? How can we ensure that my application is running slowly isn t met with a barrage of technical expertise that doesn t actually yield results very quickly? The answer is not to buy more domain specific tools. Most organizations already have plenty of tools within each technical silo network analyzers, database profilers, and so forth. They re not helping because each tool only looks at one potential part of the problem. Also, those silo tools don t come into play until after your first tier of technical support has tossed the problem up the chain of command. What we really want is a way to make the first tier of technical support more effective because that will also make subsequent tiers more effective and efficient. And I know what you re thinking: Our Help desk folks are smart but not that experienced that s why they re on the Help desk! We often think that making the Help desk more effective means giving the Help desk more tools and teaching them how to use them. That s an education approach, and sometimes that s not practical. First, your first tier of support may well lack the background experience to use those tools. Second, you ll just be giving them the same silo specific tools you were already using. Moving the tools to a lower tier of support isn t the answer, either. So what is the answer? Enable the Help Desk The answer is to enable the Help desk, or whatever you call your first tier of support. Not necessarily educate them and not try to make them as smart as your second or third tier experts, but to enable the Help desk. Specifically, enable the Help desk to do a better job of verifying slow applications and routing the incident to the correct portion of your second or third tier. What we need is a tool that can pinpoint exactly which bit of a complex application is causing or contributing to a slowdown. That lets them refer the problem to the experts responsible for that bit: No more looking, guessing, fixing, and repeating. The tool needs to look at the entire application, including all of its dependencies, back end components, and other elements. That tool needs to understand the shape of the application and how the various components fit together, and it needs to be able to view their performance characteristics in real time so that it can spot those temporary slowdowns that bother users and frustrate technical experts. 7
11 Enable a Focused, System Wide Approach We IT experts have to stop thinking of our applications as a collection of building blocks, and instead think of them as a single entity composed of many different contributing elements all working in tandem. A building engineer doesn t think of girders, concrete, and windows; he thinks about the building. Sure, girders are a part of it, but once welded and riveted together, those girders behave differently than they did as individual units. If the building s exterior starts to show cracks, the engineer has to consider not only the girders but also how they ve been attached, how they re affected by the load of the building s walls and contents, and so forth, all as a single, interconnected set of elements. He that one engineer has to consider all the elements that make up the building, even if he isn t personally an expert in, say, windows. That s where we need to take our application troubleshooting. Everyone, from the Help desk on up, needs to be able to see the entire application not just their individual silos. Everyone who troubleshoots a slow application needs to be aware of every element of that application, how those elements interact, how they fit together, and how they might as a unit be exhibiting performance problems that aren t immediately apparent in any individual component taken by itself. Here s another non computer example: Suppose you have a car that s getting really poor gas mileage. You disassemble the car and start testing each component pretty much exactly how we troubleshoot slow applications today. The engine seems to be running well, the drive train is in good shape, and the tires look to be properly inflated. So where s the problem? Well, maybe you take a guess and rebuild the engine. You reassemble the car and the problem is still there. Looking at individual elements of a system will almost never reveal the cause of a performance problem because those elements work differently on their own than they do as part of the system. To find the problem with the car, you need to examine those components when assembled as a car, not individually. You need to put little sensors and stuff on each component, and monitor them as the entire car runs. You might find out that the car s chassis is too heavy and that places stress on the drive train, which makes the engine work harder something you d never see if you examined individual components by themselves. To start troubleshooting our applications as systems, rather than as individual components, we need to focus less on our silo specific tools such as database profilers and network analyzers. Instead, we need to find tools that can look at the entire application every element, every component and all in real time. 8
12 Find Tools for the Application, Not for Silos The idea of looking at an entire application s performance is hardly novel. One of my first IT jobs was as an AS/400 system operator, and we had a tool that could, in real time, analyze each aspect of a running process performance. It would tell us if a slow process was slow because of memory, processor time, database responsiveness, and so on. Of course, an AS/400 is a completely self contained system, so our troubleshooting tool wasn t terribly complicated. Modern tools exist that extend the same concept to today s complex, multi tier, distributed applications. They understand or can be configured to understand that the application may start with a single process running on someone s client computer, but that the application also consists of an underlying network, a back end database, numerous other processes and components, and so forth. These tools can check the performance of each element in real time and can do so continuously, actually alerting you in advance when an application element s performance strays outside normal parameters. These tools enable a holistic, system wide look at the application. They can make it easy to see which bit of the application isn t performing properly, and they do that while looking at the entire application. A Wish List for Application Management and Analysis There s a problem with some whole application monitoring and troubleshooting tools, though: installation and configuration. If the tool requires you to manually explain to it how the various application components fit together, you re less likely to use the tool. You re less likely to keep it updated as the application changes. You re more likely to make mistakes or miss components, giving the tool a lopsided, inaccurate view of the entire system. So with that in mind, I ll propose a sort of wish list for what a good, system wide application troubleshooting tool might be able to do. First on the list is automatic. Ideally, a tool should take a few minutes to install, and you should be able to point it at a running application. It should then take over, figuring out on its own what the application looks like and what dependencies that application has. The result is an application map, and it might offer views like the one in Figure 1. 9
13 Figure 1: Looking at the entire application. This view offers a list of applications on the left, listed by name. When reports of slow applications start coming in, the Help desk can select that application from the list, and look at the performance of each component that makes up that application. That leads to the second item on the list: intuitive. This tool has to be usable by the Help desk, preferably with as little education as possible. It should call the Help desk s attention directly to slow application components so that the Help desk can simply notify the highertier expert responsible for those slow components. Third on the list is real time. The tool is useless if it can t display the current state of the application s components. When the Help desk opens this tool, it needs to be up to date and ready to go. Those little performance charts should be moving and changing in real time so that the Help desk can easily spot system elements that are performing outside normal parameters. The result? We always used to feel it took us 80% of our time to find the problem, and only 20% to fix it. A tool like this can really cut that 80% back a lot because it eliminates the look, guess, fix, repeat cycle. You can focus on what is actually causing the application to slow down, and spend your time fixing it, not guessing. The fourth item for my wish list is smarts. If a tool can do the first three things, there s no reason it can t proactively alert someone when a system element s performance begins to show signs of a problem. That takes us from reactive application troubleshooting to more proactive application management a wonderful thing that any organization will benefit from. 10
14 Article 3: Becoming Proactive in Application Management and Monitoring If you can find an application performance troubleshooting tool that automatically discovers and maps your application s various elements, monitors their performance in real time, and presents simple, intuitive views that help highlight performance problems for faster resolution well, then you re ready to move beyond mere reactive troubleshooting. You re ready to start adding real value to your business, and ready to start preventing slow applications. Proactive Performance Troubleshooting? Let s face it: Most companies regard IT as overhead. Technology is expensive, the people that support it are expensive, and it seems to need so much support sometimes. No matter how much you spend on IT, something always breaks which is why so many companies have estimates of how much money an hour of downtime costs them. But when IT can start anticipating problems, solving them before they become noticeable, and preventing downtime well, then IT has just become valuable to the business. And with the right toolset, you can do exactly that for slow applications. The idea is simple: If you can have your toolset notify you when an application starts to exhibit out of bounds performance, you can immediately jump on the problem. You can identify the specific system elements that are causing the slowdown, fix or mitigate the problem, and keep the application s performance from ever slowing to the point where it significantly impacts your production components. Monitoring the Entire Application, Not Just Components You may think that you have, or have seen, enterprise monitoring applications that do exactly what I m talking about: They monitor the health of network services such as , and they know how to also monitor dependent elements that support the service. All true, but they are typically neither automatic nor capable of a sufficient level of complexity. Let me explain. The idea of monitoring multiple elements of a system is definitely nothing new; enterprise monitoring tools have been doing so for years. Figure 1, for example, is the type of display many enterprise monitoring consoles might offer, showing various network services such as an server and their dependencies. When a given element exhibits out of bounds performance, the system can flag it and flag anything that depends upon that element. It helps trace the root cause of the problem, and helps direct efforts to the right location to solve the problem more quickly. 11
15 Figure 1: Enterprise monitoring tool. But there are a couple of things that these enterprise monitoring systems often lack: First is automation. If you re going to be monitoring an application, rather than just a network server or a network service such as , you don t want to have to dig through the various application elements and dependencies. That should be done automatically by observing the application to ensure that you re getting all the application s elements. Second is complexity. An service may depend on a server, which may depend on a network, which may incorporate a router. Fine that s within the realm of an enterprise monitoring tool, which can watch each of those elements. But when you dive into an individual application, things get a lot more complex. You ve got database calls, multiple sub components, and other minutiae. These elements span multiple disciplines network, software development, database, infrastructure, and more. A special kind of tool is called for, one that is specifically designed to deal with complex applications. 12
16 But that special kind of tool can provide some of the same advantages that an enterprise monitoring system would provide: It can understand performance thresholds so that it knows what levels of performance are considered good, borderline, and bad. When real time performance monitoring shows elements performance moving beyond the border of good, it can send out or pager alerts. In fact, such an application monitoring tool might even be able to raise alerts into an enterprise monitoring tool, helping keep the entire IT organization informed of a problem. Techniques for Proactive Application Management and Monitoring I ll add one item to my wish list from the previous article: reporting. If your application performance monitor is already collecting performance data in real time, there s no reason it can t store that data and produce management reports much as an enterprise monitoring solution might produce reports for overall network performance over time. Figure 2 shows what such reports might look like. Figure 2: Application performance reports. Again, these help move you from the realm of reactive troubleshooting and into the better world of proactive application management. 13
17 Another valuable item for our wish list: load curves. These are designed to show your application s overall performance as workload increases. Your developers may have produced something like this during application development, but in reality, those are just estimates and best guesses. Truly usable load curves come from monitoring application performance, down to the system element level, in a real, production environment. A properly done load curve will show you how much workload your application is capable of handling while still exhibiting acceptable performance, and how much workload it can handle before the application grinds to a complete halt. Those curves can help you project application growth, plan for application expansion, and stay ahead of the curve pun intended so that the application is always ready to handle whatever the business needs to throw at it. Faster Application Problem Resolution; More Business Value Most organizations I ve worked with are still firmly in what I call the silo world: When an application slows down, everyone tackles their own independent elements, trying to guess where the problem might be. That approach is largely driven by the silo centric tools that IT experts rely upon; change the tools, however, and you change the world. With tools that focus on the entire application, rather than on specific elements, the root cause of performance problems jumps right out at you. That means the first tier of technical support can not only verify a problem but also identify the specific silo needed to fix the problem. That silo can be engaged to solve the problem letting everyone else in the IT team continue working on their own valuable projects. There s no guessing; the right experts can move on to fixing the problem. With that kind of capability in place, you not only significantly reduce application downtime but also enable a more proactive style of application management one that offers real additional value to the business as a whole. Start seeing problems before they result in downtime. Start fixing those problems before anyone notices. Start managing the application over the long term with performance statistics, reports, and load curves staying in front of the business, rather than running behind, trying to catch up. It all comes from having the right tools: Ones that look at the entire application, automatically discovering the individual elements of a system and intuitively displaying performance in real time. That s efficient troubleshooting. 14
Why Diagnosing Application Problems is Too Hard
The Essentials Series: Improving Application Performance Troubleshooting Why Diagnosing Application Problems is Too Hard sponsored by by Why Diagnosing Application Pro blems Is Too Hard... 1 It Starts
More informationBecoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
More informationControlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
More informationCreating Unified IT Monitoring and Management in Your Environment
Creating Unified IT Monitoring and Management in Your Environment sponsored by Ch apter 2: Eliminating the Silos in IT Management... 16 Too Many Tools Means Too Few Solutions... 16 Domain Specific Tools
More informationThe Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap
More informationMaking Endpoint Encryption Work in the Real World
Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy
More informationApplication Performance Monitoring
The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 3: Discovering and Modeling Application Components... 36 Defining the Application Stack: You ll Always Miss Something...
More informationHow Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
More informationWhy Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
More informationHow Are Certificates Used?
The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...
More informationBest Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationThe Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
More informationThe Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More informationThe Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 2: Monitoring Active Directory... 14 Monitoring Goals... 14 Event Logs... 15 System
More informationBest Practices in Deploying Anti-Malware for Best Performance
The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationIsolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
More informationMatching High Availability Technology with Business Needs
The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1
More informationHow To Understand The Difference Between Network Analysis And Network Monitoring
The Essentials Series: Network Troubleshooting and Problem Identification Bandwidth Monitoring and Traffic Analysis sponsored by by Greg Shields Bandwidth Monitoring and Traffic Analysis...1 Different
More informationApplication Performance Monitoring
The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 5: Bringing It All Together: Managing Application Performance Data... 72 Ca se Study: The Application Is Slow!...
More informationDeveloping a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationThe Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationQuickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
More informationThe Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
More informationUnderstanding the Business Benefits of Managed Services
The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationEnabling Useful Active Directory Auditing
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native
More informationHow to Turn Your Network into a Strategic Business Asset with Purview EBOOK
How to Turn Your Network into a Strategic Business Asset with Purview EBOOK EBOOK TABLE OF CONTENTS Chapter 1: What is Purview and How Can It Be Used? 2 Chapter 2: Using Purview for Business Analytics
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationSteps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
More informationApplication Performance Monitoring
The Five Essential Elements of Application Performance Monitoring sponsored by Ch apter 4: Diving Deep into Your Application Components... 54 Mo ving Further In: Going from Health Problems to Component
More informationThe Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
More informationRealizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationReplication and Recovery Management Solutions
The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationRelating High Availability Metrics to Business Value
The Essentials Series: Making High Availability Pay For Itself Relating High Availability Metrics to Business Value sponsored by by Relating High-Availability Metrics to Business Value... 1 How to Explain
More informationProactive Performance Management for Enterprise Databases
Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationQuick, Easy and Inexpensive Monitoring a new MXN Service
Quick, Easy and Inexpensive Monitoring a new MXN Service If you run a large network and IT organization you know that it s difficult to stay on top of everything that goes on. So many moving parts! So
More informationHow Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
More informationWhy Alerts Suck and Monitoring Solutions need to become Smarter
An AppDynamics Business White Paper HOW MUCH REVENUE DOES IT GENERATE? Why Alerts Suck and Monitoring Solutions need to become Smarter I have yet to meet anyone in Dev or Ops who likes alerts. I ve also
More informationCan You Trust a Cloud-based Security Solution?
Using Cloud Services to Improve Web Security The Essentials Series Can You Trust a Cloud-based Security Solution? sponsored by Ca n You Trust a Cloud Based Security Solution?... 1 Clo ud Security Service
More informationActive Directory Auditing: What It Is, and What It Isn t
Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,
More informationAuditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
More informationThe Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
More informationWhere Do I Start With Virtual Desktops?
The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...
More informationMitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
More informationUnderstanding the Business Value of Infrastructure Management
The Essentials Series: Infrastructure Management Understanding the Business Value of Infrastructure Management sponsored by by Chad Marshall Understanding the Business Value of Infrastructure Management...1
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationUsing Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
More informationUnderstanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
More informationFulfilling HIPAA Compliance by Eliminating
The Essentials Series: Fulfilling Compliance by Eliminating Administrator Rights Fulfilling HIPAA Compliance by Eliminating Administrator Rights sponsored by by Greg Shields Fu lfilling HIPAA Compliance
More informationThe Shortcut Guide To
tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns
More informationA White Paper. Three Ways IT Performance Monitoring Can Save You Money And Time. Page 1
A White Paper Three Ways IT Performance Monitoring Can Save You Money And Time Page 1 Introduction Companies rely on IT systems to help employees do their work efficiently, as a means to go-to-market faster
More informationVirtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
More informationThe Essentials Series. PCI Compliance. sponsored by. by Rebecca Herold
The Essentials Series PCI Compliance sponsored by by Rebecca Herold Using PCI DSS Compliant Log Management to Identify Attacks from Outside the Enterprise...1 Outside Attacks Impact Business...1 PCI DSS
More informationA Modern Approach to Monitoring Performance in Production
An AppDynamics Business White Paper WHEN LOGGING ISN T ENOUGH A Modern Approach to Monitoring Performance in Production Ten years ago, the standard way to troubleshoot an application issue was to look
More informationNetwork Monitoring with Xian Network Manager
Network Monitoring with Xian Network Manager Did you ever got caught by surprise because of a network problem and had downtime as a result? What about monitoring your network? Network downtime or network
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationAdministration Challenges
The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1
More informationTips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
More informationGo beyond basic up/down monitoring
Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor
More informationThe Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
More informationTop 10 Considerations for Selecting the Right RMM Solution
1 Introduction The most successful IT service providers are those that find ways to differentiate themselves from the competition and consistently strive to retain loyal customers. In an increasingly crowded
More information10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
More informationThe Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 6: Active Directory Best Practices... 77 Should You Rethink Your Forest and Domain
More informationActive Directory Recovery: What It Is, and What It Isn t
Active Directory Recovery: What It Is, and What It Isn t Abstract Does your Active Directory recovery plan address all of the most common failure scenarios? This white paper explains how to handle each
More informationSolving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems
Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationAutomated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
More informationTHE WINDOWS AZURE PROGRAMMING MODEL
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
More informationWHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
More informationThe Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
More informationBenefits of Using Data Loss Prevention Technology
The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated
More informationWhy Native Windows Defragmentation Isn t Enough
Why Native Windows Defragmentation Isn t Enough The Essentials Series Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high-quality
More informationReducing Backups with Data Deduplication
The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...
More informationData Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
More informationBusiness Communications Tools and Solutions
Building Business Productivity with Unified Communications The Essentials Series Networking for Increased Productivity and Reduced Costs sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationOrganized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
More informationThe Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
More informationPerform-Tools. Powering your performance
Perform-Tools Powering your performance Perform-Tools With Perform-Tools, optimizing Microsoft Dynamics products on a SQL Server platform never was this easy. They are a fully tested and supported set
More informationApplication Performance Monitoring
The Five Essential Elements of Application Performance Monitoring sponsored by Introduction to Realtime Publishers by, Series Editor For several years now, Realtime has produced dozens and dozens of high
More informationQuickBooks Solutions for Your Business. Thinking Beyond the Ledger TLC FOR YOUR QB 7 TIPS TO KEEP THE QUICKBOOKS LOVE ALIVE
QuickBooks Solutions for Your Business Thinking Beyond the Ledger TLC FOR YOUR QB 7 TIPS TO KEEP THE QUICKBOOKS LOVE ALIVE Put Scott s 30 Years of Experience to Work For You Don t let QuickBooks be a pain
More information