Tip #1: Collaboration Often users are not only operating their own devices at work, but also a range of independent project management apps. While these SMAC apps (social, mobile, analytics and cloud), offer tremendous benefits for employees, IT and database administrators are often unaware of these apps, and hence, how to optimize them toRead More
Measure the Real End-User Experience
SharePath Real User Monitoring (RUM) Express provides a real-time view into the actual experience of your end-user, including availability, response times, and service levels. This free, enterprise-class software helps isolate problems and pinpoint bottlenecks in your data center, network, or online application.
Monitor all transactions 24×7 for visibility into the true end-user experience and know whether any applications require immediate attention.
85% Lower Cost
Supports multiple applications for approximately 85% less than other comparable real user monitoring solutions.
The millennial generation, or Generation Y, born between 1980 and 2000, already constitutes 25% of the workforce in the US, and by 2020, will form 50% of the global workforce − which means that their career aspirations, attitudes about work, and knowledge and usage of technologies will define the culture of the 21st century workplace.Read More
On Thursday 23 June 2016, a referendum was held in the UK to decide whether the UK should leave or remain in the European Union. Fifty-two percent voted for Britain to leave the EU, leading to much speculation about the future – both for Britain and the rest of world. In order for the UKRead More
Over the years, certain trends have created a need for increased information technology implementation within the judicial system. Factors such as legal practice becoming more technologically involved, and the transition from a paper-based system to an e-file based judicial process led to a situation where most of the court’s existing systems were simply outdated andRead More
Every company develops tools for internal use, and many companies base these tools on existing sources. Correlsense is no exception, and we decided to share the changes we made to code we found online for the benefit of the community. So why did we need SSL decryption anyway? Well, we didn’t… Network traffic analysis isRead More
The first time I felt embarrassed about not knowing something in my field was back in 2000. I was a junior web developer at Partner Communications and all of a sudden wherever you went, you would hear those 3 magic letters – XML. Until then, developing web applications usually meant working with a relational DBRead More
In the not so distant past, the common browsers were Microsoft Internet Explorer (IE) and Netscape Navigator, and web developers usually had an assortment of browsers installed on their machines, together with multiple remote or virtual machines (as it was impossible to install different versions of IE). And if that wasn’t enough, the competitive environmentRead More
We’ve all heard of Docker by now. One of the main reasons for using Docker is to eliminate the support-matrix hell. Instead of developing on a machine that has little in common with the test and production environments, you’re creating a closed container or environment with everything your application needs to run. You canRead More
Apple has announced that with iOS8, which was made available to the public on September 17, Apple no longer stores the encryption key of the device so that the device can be unlocked by law enforcement. This encryption architecture is important for the corporate reader to understand, to help protect corporate assets. So I thoughtRead More
This post is not a usual one since I simply want to address a technical question: “what is Java bytecode instrumentation (BCI)” and also explain what can and can’t be done with BCI regarding the problem of transaction tracing. It’s just that I’ve been asked about it again and again, and there is a real confusionRead More