Here we explain how SharePath Transaction Topology Mapping works and how it lets users pinpoint performance problems in an application and automatically map components in an architecture through auto discovery.
What is transaction topology mapping?
A topology is a directional … Read More
In the perfectly elastic, brand new, and unfortunately mythical enterprise that we mentioned earlier, all applications were developed using Java, .Net, PHP, Ruby, or another modern environment. It is certainly true that there are many Enterprise Application Performance Management … Read More
In order to have a better understanding about performance monitoring, one should have some understanding of statistics. (This is increasingly true as that is the technology that drives analytics.) The most basic statistics are the average, standard deviation, and the … Read More
Some of our readers have expressed concerns about the impact of surveillance of communications and network traffic. They view this as a potential problem for business in general, and cloud-based applications in particular.
Vodafone is one of the world’s largest … Read More
Healthcare start-up Oscar raised $80 million at a 10X multiple. Launched in October 2013, it offers an easy-to-use website with a Google Map-style doctor-finder and a search tool that lets you describe symptoms in plain English. Other features allow you … Read More
Some observers are concerned that decreased competition might result if the Comcast-Time Warner merger is approved; here are some recent developments.
Critics dismissed the companies’ claim that such a merger would not drive up prices and stifle the competition, because … Read More
There are two items of news which, in my view, have not been adequately reported in the media or not correctly covered.
Here we give a brief overview of processor performance monitoring with the Microsoft Performance monitor. The Windows Performance monitor (perfmon) is a tool that you can use to take a look at an individual Windows server. It is including with … Read More
People know that phishing lets hackers invade computers using drive by downloads. But how does this actually work? Let’s look at one example.
Recently Microsoft released this security advisory:
* Microsoft Security Advisory (2934088)
– Title: Vulnerability in Internet Explorer … Read More
Nginx is said to be fast. Apache is said to be powerful. For that reason Nginx is often used to serve up static content while Apache and other servers are given the work that requires heavy lifting.
Nginx is an … Read More