The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom MetricsCopperEgg Logo

Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all is the person who calls out the prices and acknowledges the bids. The auctioneer uses a keen eye to identify the most subtle of gestures from the audience: the flick of a single index finger, a raised eyebrow, or a gesture of the head is all that is needed to read the intentions of the bidding floor and move the process ever upwards.

Wouldn’t it be great if that same subtle ability existed for IT managers? To be able to look over a collection of dashboards and readouts and immediately detect a subtle spike or an errant digit that signifies trouble ahead? Granted, there are some people who are able to do just this – usually after many years of constant practice and daily experience – but for companies struggling with continued growth as well as modifications and upgrades to their systems as well as a highly volatile marketplace, the capacity to notice subtle warning signs just can’t keep pace.

An inability to spot trouble or page load delays due to the overwhelming amount of data to monitor is the reason why all IT managers need to ensure they are working hand-in-hand with applications that can do the job for them. As a recent PEER-1 report shows, shoppers insist on a faultless online shopping experience, and will readily abandon an online shopping cart because of slow websites, time-outs and long page load times. The PEER-1 report reveals also that such dissatisfaction then becomes negatively linked in the customer’s mind, to the brand they were seeking to purchase.

Another recent report, published by Load Impact shows that 40% of e-commerce respondents to their study “reported losing money in the last year due to performance issues, compared to only 25 percent of sites in other categories.” Other crucial facts from this study included:

  • Sixty percent of companies overestimate their site’s capacity to handle user traffic.
  • Ninety-eight percent of e-tailers thought sub 2-second response time was desirable.
  • Very few respondents load-test the mobile versions of their sites.

Eric Anderson, CTO and co-founder of Austin, TX-based CopperEgg, points out that the essential missing piece in the monitoring puzzle is custom metrics: in other words, building a system that speaks directly to the operator. “Nobody can cover everything,” he says, “so you need to be able to feed in all kinds of important business metrics and parameters. Whether these data points are granular or high level, they need to be visualized both over time and just in time.” He explains that when there is an issue that affects a critical element such as load time, the problem might be an immediate one, or it may be necessary to look back over the past 24 hours, or 30 days, to identify a pattern, a spike or some other tell-tale indicator of an anomaly – something that displays not only that something did change, but when it changed.

This, he says, is the difference between basic monitoring and the more custom monitoring systems that companies such as CopperEgg provide. The high-speed platform upon which all servers operate, both under the hood, but equally importantly in front of the end client requires the keen eye of a seasoned auctioneer, since, in both worlds, a great deal of money is at stake. When admins are empowered to fine tune the monitoring interface to speak to the key issues and put aside potential distractions, the goal of attaining maximized uptime and reliability gets a little closer.

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice 

Sponsored Post  By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…