Apple iOS Encryption

Apple has announced that with iOS8, which was made available to the public on September 17, Apple no longer stores the encryption key of the device so that the device can be unlocked by law enforcement. This encryption architecture is … Read More

Java Bytecode Instrumentation: An Introduction

lanir-shachamThis post is not a usual one since I simply want to address a technical question: “what is Java bytecode instrumentation (BCI)” and also explain what can and can’t be done with BCI regarding the problem of transaction tracing. … Read More

APM Transaction Topology Mapping

AntonHere we explain how SharePath Transaction Topology Mapping works and how it lets users pinpoint performance problems in an application and automatically map components in an architecture through auto discovery.

What is transaction topology mapping?

A topology is a directional Read More

Enterprise Application Performance Management


elad-katavIn the perfectly elastic, brand new, and unfortunately mythical enterprise that we mentioned earlier, all applications were developed using Java, .Net, PHP, Ruby, or another modern environment. It is certainly true that there are many Enterprise Application Performance Management … Read More

Software Application Performance


yossi-shirizliHow do you escape from good Enough island?

Most people start with a fresh look at their strategy, architecture, and software portfolio. They do a white board exercise and design a cloud-centered, standards-based, open source, SaaS, PaaS, IaaS, NaaS, … Read More

Redefining Application Performance

arnaud-davidRemember three-second response times?

In the days when everyone wore a suit to work, application performance was measured in seconds. Any response time less than three seconds was a victory. At five seconds, the telephone calls began. More than that … Read More

The Top 3 Reasons an Application Hangs

lanir-shachamDo you experience application hang problems? If so, read this article to discover the top 3 reasons applications hang and cause slow performance.

If you have been in the IT industry long enough, you probably know this story well. The … Read More

Performance Monitoring Basic Statistics and Google Sheets

In order to have a better understanding about performance monitoring, one should have some understanding of statistics. (This is increasingly true as that is the technology that drives analytics.) The most basic statistics are the average, standard deviation, and the … Read More

Vodafone Outlines Surveillance Impact

Some of our readers have expressed concerns about the impact of surveillance of communications and network traffic. They view this as a potential problem for business in general, and cloud-based applications in particular.

Vodafone is one of the world’s largest … Read More

Root Cause Analysis

One should adopt a systemic approach to root cause analysis, so that the same procedure can be deployed over and again and improved with each iteration to find and correct weaknesses in processes and system. Plus to put this into … Read More

eBay Passwords Stolen: How Hackers Attack

eBay sent out this email to more than 350 million people this week, saying their password database had been stolen by hackers. eBay owns Paypal, so there is a real threat to your pocketbook if you don’t change your password … Read More

Disruptive Healthcare Provider Raises $80M

Healthcare start-up Oscar raised $80 million at a 10X multiple. Launched in October 2013, it offers an easy-to-use website with a Google Map-style doctor-finder and a search tool that lets you describe symptoms in plain English. Other features allow you … Read More

The Proposed Comcast-Time Warner Merger

Some observers are concerned that decreased competition might result if the Comcast-Time Warner merger is approved; here are some recent developments.

Critics dismissed the companies’ claim that such a merger would not drive up prices and stifle the competition, because … Read More

Game Changing Developments in Privacy Requirements

There are two items of news which, in my view, have not been adequately reported in the media or not correctly covered.

The first is that Europe’s highest court has overturned the EU’s Data Retention requirement, saying it is unconstitutional.  … Read More

Intel Performance Counter Monitor

If you want to know what each core on each CPU in your system is doing, you need a more sophisticated tool than the Windows Performance Monitor.  Intel offers a tool that you can download and compile to get core-level … Read More

Michaels Retailer Loses 3 Million Credit Cards

What is Brian Krebs looking at this week?  The newspapers and tech blogs usually turn to the former Washington Post reporter first, because he has a wide network of contacts who usually inform him of current security issues before anyone … Read More

Using the Windows Performance Monitor to monitor Processors

Here we give a brief overview of processor performance monitoring with the Microsoft Performance monitor.  The Windows Performance monitor (perfmon) is a tool that you can use to take a look at an individual Windows server.  It is including with … Read More

The Heartbeat Bug

By now you have heard about the Heartbeat security issue with OpenSSL.  Here we are going to describe what exactly the problem is and how it affects Apache and Nginx web servers.


Most web servers use OpenSSL for encrypting … Read More

How Malware Actually Infects the Computer

People know that phishing lets hackers invade computers using drive by downloads. But how does this actually work? Let’s look at one example.

Recently Microsoft released this security advisory:

* Microsoft Security Advisory (2934088)
– Title: Vulnerability in Internet Explorer … Read More

Use the Nginx Proxy and Web Server to Boost Performance

Nginx is said to be fast. Apache is said to be powerful. For that reason Nginx is often used to serve up static content while Apache and other servers are given the work that requires heavy lifting.

Nginx is an … Read More