The Power Of Custom Metrics

The Power Of Custom Metrics

The Power of Custom MetricsCopperEgg Logo

Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a deal. A well-run auction is a fascinating event to watch, and most interesting of all is the person who calls out the prices and acknowledges the bids. The auctioneer uses a keen eye to identify the most subtle of gestures from the audience: the flick of a single index finger, a raised eyebrow, or a gesture of the head is all that is needed to read the intentions of the bidding floor and move the process ever upwards.

Wouldn’t it be great if that same subtle ability existed for IT managers? To be able to look over a collection of dashboards and readouts and immediately detect a subtle spike or an errant digit that signifies trouble ahead? Granted, there are some people who are able to do just this – usually after many years of constant practice and daily experience – but for companies struggling with continued growth as well as modifications and upgrades to their systems as well as a highly volatile marketplace, the capacity to notice subtle warning signs just can’t keep pace.

An inability to spot trouble or page load delays due to the overwhelming amount of data to monitor is the reason why all IT managers need to ensure they are working hand-in-hand with applications that can do the job for them. As a recent PEER-1 report shows, shoppers insist on a faultless online shopping experience, and will readily abandon an online shopping cart because of slow websites, time-outs and long page load times. The PEER-1 report reveals also that such dissatisfaction then becomes negatively linked in the customer’s mind, to the brand they were seeking to purchase.

Another recent report, published by Load Impact shows that 40% of e-commerce respondents to their study “reported losing money in the last year due to performance issues, compared to only 25 percent of sites in other categories.” Other crucial facts from this study included:

  • Sixty percent of companies overestimate their site’s capacity to handle user traffic.
  • Ninety-eight percent of e-tailers thought sub 2-second response time was desirable.
  • Very few respondents load-test the mobile versions of their sites.

Eric Anderson, CTO and co-founder of Austin, TX-based CopperEgg, points out that the essential missing piece in the monitoring puzzle is custom metrics: in other words, building a system that speaks directly to the operator. “Nobody can cover everything,” he says, “so you need to be able to feed in all kinds of important business metrics and parameters. Whether these data points are granular or high level, they need to be visualized both over time and just in time.” He explains that when there is an issue that affects a critical element such as load time, the problem might be an immediate one, or it may be necessary to look back over the past 24 hours, or 30 days, to identify a pattern, a spike or some other tell-tale indicator of an anomaly – something that displays not only that something did change, but when it changed.

This, he says, is the difference between basic monitoring and the more custom monitoring systems that companies such as CopperEgg provide. The high-speed platform upon which all servers operate, both under the hood, but equally importantly in front of the end client requires the keen eye of a seasoned auctioneer, since, in both worlds, a great deal of money is at stake. When admins are empowered to fine tune the monitoring interface to speak to the key issues and put aside potential distractions, the goal of attaining maximized uptime and reliability gets a little closer.

CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice 

Sponsored Post  By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…