The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom MetricsCopperEgg Logo

Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all is the person who calls out the prices and acknowledges the bids. The auctioneer uses a keen eye to identify the most subtle of gestures from the audience: the flick of a single index finger, a raised eyebrow, or a gesture of the head is all that is needed to read the intentions of the bidding floor and move the process ever upwards.

Wouldn’t it be great if that same subtle ability existed for IT managers? To be able to look over a collection of dashboards and readouts and immediately detect a subtle spike or an errant digit that signifies trouble ahead? Granted, there are some people who are able to do just this – usually after many years of constant practice and daily experience – but for companies struggling with continued growth as well as modifications and upgrades to their systems as well as a highly volatile marketplace, the capacity to notice subtle warning signs just can’t keep pace.

An inability to spot trouble or page load delays due to the overwhelming amount of data to monitor is the reason why all IT managers need to ensure they are working hand-in-hand with applications that can do the job for them. As a recent PEER-1 report shows, shoppers insist on a faultless online shopping experience, and will readily abandon an online shopping cart because of slow websites, time-outs and long page load times. The PEER-1 report reveals also that such dissatisfaction then becomes negatively linked in the customer’s mind, to the brand they were seeking to purchase.

Another recent report, published by Load Impact shows that 40% of e-commerce respondents to their study “reported losing money in the last year due to performance issues, compared to only 25 percent of sites in other categories.” Other crucial facts from this study included:

  • Sixty percent of companies overestimate their site’s capacity to handle user traffic.
  • Ninety-eight percent of e-tailers thought sub 2-second response time was desirable.
  • Very few respondents load-test the mobile versions of their sites.

Eric Anderson, CTO and co-founder of Austin, TX-based CopperEgg, points out that the essential missing piece in the monitoring puzzle is custom metrics: in other words, building a system that speaks directly to the operator. “Nobody can cover everything,” he says, “so you need to be able to feed in all kinds of important business metrics and parameters. Whether these data points are granular or high level, they need to be visualized both over time and just in time.” He explains that when there is an issue that affects a critical element such as load time, the problem might be an immediate one, or it may be necessary to look back over the past 24 hours, or 30 days, to identify a pattern, a spike or some other tell-tale indicator of an anomaly – something that displays not only that something did change, but when it changed.

This, he says, is the difference between basic monitoring and the more custom monitoring systems that companies such as CopperEgg provide. The high-speed platform upon which all servers operate, both under the hood, but equally importantly in front of the end client requires the keen eye of a seasoned auctioneer, since, in both worlds, a great deal of money is at stake. When admins are empowered to fine tune the monitoring interface to speak to the key issues and put aside potential distractions, the goal of attaining maximized uptime and reliability gets a little closer.

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice 

Sponsored Post  By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…