Feeds

Application QoS – where's the measuring tape?

Taking the business view of metrics

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

IT has undergone a major development in the last few years, namely the acknowledgment that end users have little or no interest in how the application or service is delivered to them - so long as it is delivered and meets their own service level criteria.

The background mechanics of the delivery should be of no concern to the business. In other words, IT is almost at a stage when, to a large degree, users can regard the service almost as a utility: turn on, use, turn off. More pertinently, users now expect IT services to be available whenever they wish, wherever they happen to be. This throws into the spotlight the question of how best to measure the “quality of IT service delivery”

Today, “application management” consists mostly of monitoring the functions of major business applications and the supporting IT infrastructure. But this IT view of applications tends not to take into account the metrics that most matter to business users, namely some indication of business oriented performance, such as end user application response time or some other metric that illustrates, in terms understandable by a line-of-business user, the level of service delivery.

What kinds of metrics would make more sense from a business perspective? The numbers of orders that may be processed per hour, the times during which service will be delivered and supported and the end users response times for particular transactions are examples. Service Level Management tools are now reaching a maturity that is bringing this intriguing area to the forefront in many organisations, a development that has been sadly neglected until recent times.

SLA survey results

As the figure above illustrates, the use of SLA management using business metrics is a focus of attention in very many organisations, a result highlighted in a Freeform Dynamics report.

This need to measure real application response times and availability from the perspective of a user has created a demand for tools that address end to end application monitoring. A number of vendors supply such tools that provide these measurement capabilities using either agent-based topologies or “robots” that simulate end users transactions. Each method has its advantages and disadvantages.

Robo Cop

Agent-based systems deploy small programs on the systems of end users to measure their use of the applications and measures the end to end response times of the transactions. The advantage of this method is that real transactions are measured on real user systems. The disadvantage is that the tool depends upon the user being at work and accessing the services to be measured. To avoid receiving no information it may be required that many agents be deployed and this can result in an avalanche of data being collected.

Robot transaction simulation systems can be programmed to perform regardless of user activity and can provide good results even when user activity is low - or performance is so slow that real users abandon the service. But few organisations are prepared to allow robot simulations to update their real data systems. Consequently, robots may not provide a complete picture of the service delivered to real users. It appears that with the tools available today, a combination of agent based and transaction simulation systems would provide the best solution to the issue of measuring service level delivery.

The end-to-end monitoring market is developing apace and sophisticated functionality is now available to meet the growing demand for service level monitoring and reporting. There is much room for these systems to integrate with enterprise management tools to provide valuable additional information to global monitoring systems and root cause analysis of infrastructure issues.

Couple this with virtualisation solutions, and effective change management processes, and IT staff have the key to service delivery in their hands and also the potential to both maximise the benefit that IT can deliver to the business but also to show that they are doing so.

Nonetheless, these tools must be used with discretion and it is essential that some basic questions are asked before SLA monitoring takes place. Chief among these are the absolute requirement to identify what services are important to users and to ensure that reasonable, measurable SLAs are agreed. With this knowledge, appropriate technology tools can be put in place to supply the measurements that qualify the quality of the business service that is delivered, rather than some arbitrary technical criteria.

Top three mobile application threats

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.