How is Generation Y reshaping the workplace and application performance in the workplace?

The millennial generation, or Generation Y, born between 1980 and 2000, already constitutes 25% of the workforce in the US, and by 2020, will form 50% of the global workforce − which means that their career aspirations, attitudes… Read More

Brexit and Application Performance Management (APM) – What’s the Connection?

On Thursday 23 June 2016, a referendum was held in the UK to decide whether the UK should leave or remain in the European Union. Fifty-two percent voted for Britain to leave the EU, leading to much speculation… Read More

IT in the US Judicial System – Friend or Foe?

Over the years, certain trends have created a need for increased information technology implementation within the judicial system. Factors such as legal practice becoming more technologically involved, and the transition from a paper-based system to an e-file based judicial process led to a situation where most of the court’s existing systems were simply outdated and functionally unsustainable. Read more…

Open-Sourcing Upgrades to SSL-Decryption Library

Every company develops tools for internal use, and many companies base these tools on existing sources. Correlsense is no exception, and we decided to share the changes we made to code we found online for the benefit of… Read More

Buzzwords – No Need to be Terrified

The first time I felt embarrassed about not knowing something in my field was back in 2000. I was a junior web developer at Partner Communications and all of a sudden wherever you went, you would hear those 3 magic letters – XML. Read more…

Automating Docker Container Monitoring

In my previous blog post (APMing docker-contained applications), I discussed two ways to approaching the monitoring of software running inside docker containers: Internal – all the monitoring software components run inside the monitored container. Shared agent – there… Read More

Web Development History at a Glance

In the not so distant past, the common browsers were Microsoft Internet Explorer (IE) and Netscape Navigator, and web developers usually had an assortment of browsers installed on their machines, together with multiple remote or virtual machines (as it was impossible to install different versions of IE). Read more…

APMing Docker-Contained Applications

We’ve all heard of Docker by now. One of the main reasons for using Docker is to eliminate the support-matrix hell. Instead of developing on a machine that has little in common with the test and production environments,… Read More

Apple iOS Encryption

Apple has announced that with iOS8, which was made available to the public on September 17, Apple no longer stores the encryption key of the device so that the device can be unlocked by law enforcement. This encryption… Read More

Java Bytecode Instrumentation: An Introduction

This post is not a usual one since I simply want to address a technical question: “what is Java bytecode instrumentation (BCI)” and also explain what can and can’t be done with BCI regarding the problem of transaction tracing…. Read More

APM Transaction Topology Mapping

Here we explain how SharePath Transaction Topology Mapping works and how it lets users pinpoint performance problems in an application and automatically map components in an architecture through auto discovery. What is transaction topology mapping? A topology is a… Read More

Enterprise Application Performance Management

  In the perfectly elastic, brand new, and unfortunately mythical enterprise that we mentioned earlier, all applications were developed using Java, .Net, PHP, Ruby, or another modern environment. It is certainly true that there are many Enterprise Application… Read More

Software Application Performance

  How do you escape from good Enough island? Most people start with a fresh look at their strategy, architecture, and software portfolio. They do a white board exercise and design a cloud-centered, standards-based, open source, SaaS, PaaS,… Read More

Redefining Application Performance

Remember three-second response times? In the days when everyone wore a suit to work, application performance was measured in seconds. Any response time less than three seconds was a victory. At five seconds, the telephone calls began. More than that and… Read More

The Top 3 Reasons an Application Hangs

Do you experience application hang problems? If so, read this article to discover the top 3 reasons applications hang and cause slow performance. If you have been in the IT industry long enough, you probably know this story… Read More

Performance Monitoring Basic Statistics and Google Sheets

In order to have a better understanding about performance monitoring, one should have some understanding of statistics. (This is increasingly true as that is the technology that drives analytics.) The most basic statistics are the average, standard deviation,… Read More

Vodafone Outlines Surveillance Impact

Some of our readers have expressed concerns about the impact of surveillance of communications and network traffic. They view this as a potential problem for business in general, and cloud-based applications in particular. Vodafone is one of the… Read More

Root Cause Analysis

One should adopt a systemic approach to root cause analysis, so that the same procedure can be deployed over and again and improved with each iteration to find and correct weaknesses in processes and system. Plus to put… Read More

eBay Passwords Stolen: How Hackers Attack

eBay sent out this email to more than 350 million people this week, saying their password database had been stolen by hackers. eBay owns Paypal, so there is a real threat to your pocketbook if you don’t change… Read More

Disruptive Healthcare Provider Raises $80M

Healthcare start-up Oscar raised $80 million at a 10X multiple. Launched in October 2013, it offers an easy-to-use website with a Google Map-style doctor-finder and a search tool that lets you describe symptoms in plain English. Other features… Read More