The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom MetricsCopperEgg Logo

Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all is the person who calls out the prices and acknowledges the bids. The auctioneer uses a keen eye to identify the most subtle of gestures from the audience: the flick of a single index finger, a raised eyebrow, or a gesture of the head is all that is needed to read the intentions of the bidding floor and move the process ever upwards.

Wouldn’t it be great if that same subtle ability existed for IT managers? To be able to look over a collection of dashboards and readouts and immediately detect a subtle spike or an errant digit that signifies trouble ahead? Granted, there are some people who are able to do just this – usually after many years of constant practice and daily experience – but for companies struggling with continued growth as well as modifications and upgrades to their systems as well as a highly volatile marketplace, the capacity to notice subtle warning signs just can’t keep pace.

An inability to spot trouble or page load delays due to the overwhelming amount of data to monitor is the reason why all IT managers need to ensure they are working hand-in-hand with applications that can do the job for them. As a recent PEER-1 report shows, shoppers insist on a faultless online shopping experience, and will readily abandon an online shopping cart because of slow websites, time-outs and long page load times. The PEER-1 report reveals also that such dissatisfaction then becomes negatively linked in the customer’s mind, to the brand they were seeking to purchase.

Another recent report, published by Load Impact shows that 40% of e-commerce respondents to their study “reported losing money in the last year due to performance issues, compared to only 25 percent of sites in other categories.” Other crucial facts from this study included:

  • Sixty percent of companies overestimate their site’s capacity to handle user traffic.
  • Ninety-eight percent of e-tailers thought sub 2-second response time was desirable.
  • Very few respondents load-test the mobile versions of their sites.

Eric Anderson, CTO and co-founder of Austin, TX-based CopperEgg, points out that the essential missing piece in the monitoring puzzle is custom metrics: in other words, building a system that speaks directly to the operator. “Nobody can cover everything,” he says, “so you need to be able to feed in all kinds of important business metrics and parameters. Whether these data points are granular or high level, they need to be visualized both over time and just in time.” He explains that when there is an issue that affects a critical element such as load time, the problem might be an immediate one, or it may be necessary to look back over the past 24 hours, or 30 days, to identify a pattern, a spike or some other tell-tale indicator of an anomaly – something that displays not only that something did change, but when it changed.

This, he says, is the difference between basic monitoring and the more custom monitoring systems that companies such as CopperEgg provide. The high-speed platform upon which all servers operate, both under the hood, but equally importantly in front of the end client requires the keen eye of a seasoned auctioneer, since, in both worlds, a great deal of money is at stake. When admins are empowered to fine tune the monitoring interface to speak to the key issues and put aside potential distractions, the goal of attaining maximized uptime and reliability gets a little closer.

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice 

Sponsored Post  By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

What Do You Do With A Drunken Sailor? Look To The Cloud

What Do You Do With A Drunken Sailor? Look To The Cloud

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and is popular among US Service members abroad, where mobile phones are not permitted for use…

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…