|By Marketwired .||
|February 26, 2014 07:30 AM EST||
MOUNTAIN VIEW, CA -- (Marketwired) -- 02/26/14 -- Boundary announces major upgrades to its cloud-based consolidated IT operations monitoring software. Boundary's latest capabilities include a vastly improved user experience, customized event dashboards, and faster deployments of Boundary meters. Boundary also has extended meter coverage and capabilities to better handle denial of service attacks and support three new operating systems: Fedora 14, OS-X and openSUSE.
Boundary's latest product announcement comes on the heels of a major milestone that the company's service reached in January: processing an average of 1.5 trillion application and infrastructure performance metrics per day on behalf of clients, a 400% year-over-year increase.
Boundary's newly released capabilities for consolidated IT operations monitoring and event management are summarized here:
New UI & Contextual Navigation
Based on customer feedback, user experience analysis and streamlined workflow research, Boundary has developed a new UI that vastly reduces the time needed to identify and resolve performance problems. A redesigned vertical navigation bar improves screen space utilization and contextual filters help users quickly navigate from problem notification (event view) to impact analysis (topology view) to detailed diagnostics (streams view) in a matter of seconds -- a 75% efficiency improvement from the previous version of Boundary and a massive advantage compared to the time similar activities take using legacy on-premise tools.
Customized Event Dashboards
Boundary now lets end-users easily create customized event dashboards that provide a "single pane of glass" showing which systems are generating the most events. For example, you can see how many events are coming from New Relic, Chef, Nagios and other monitoring tools in one view. Event dashboards can include detailed information such as how many AWS events are being generated by specific AWS API calls.
Boundary has significantly accelerated deployments of meters. By eliminating the need for user input on initial installation, companies can more easily use automated change management tools such as Chef and Puppet to deploy and manage the Boundary meter on Windows machines. Boundary also introduced the capability to deploy the same meter using install parameters referencing appropriate tags as well as the ability to install the meter in multiple locations at once such as Test, Staging and Production. These enhancements reduce IT deployment time while adding increased automation. Finally, on servers with many thousands of simultaneous connections running on Linux systems, the meter now starts many times faster on heavily loaded servers.
Boundary has improved local filtering which prioritizes application traffic in the meter. For example, if a meter cannot connect to the Boundary service the customer now has the option of storing the flows locally at the client and then streaming them once connectivity is back. This is especially useful when guarantees and SLA's are relevant.
Decreased Memory Usage and Improved Buffering
Boundary has improved free memory cache efficiency, resulting in memory now being yielded to the OS more aggressively resulting in a 50% reduction in average memory usage. Improved IPFIX data buffering prevents a large build-up of data to be transmitted, reducing memory utilization in high-traffic scenarios. This also improves the meter's handling of Denial of Service (DoS) scenarios by 60% as Boundary has reduced the meter's memory utilization to avoid contributing to the traffic load and risk of server crashes.
"Traditional IT monitoring systems are not keeping pace with the highly-distributed and highly dynamic nature of IT environments today, which are dependent upon hundreds of services, applications and hybrid networks. Boundary's solution continues to push the needle by analyzing more data from more places faster, integrating disparate tools for a comprehensive view and having a low impact on IT resources in the process," says Bernd Harzog, Performance and Capacity Management Analyst for The Virtualization Practice.
"Outbrain's global content discovery platform depends upon hundreds of services and data sources, which makes the task of tracking interactions between components a massive undertaking," says Shai Peretz, SVP Operations & IT at Outbrain. "Yet doing so is critical due to our highly-distributed infrastructure. We rely upon Boundary to uncover and track anomalies in data flows and to optimize load balancing and configurations. Boundary gives us better visibility across the entire environment, which makes it easier to fix problems when they come up."
"This is our most significant product announcement to date, and is in direct response to the complex needs of our customers who are hosting applications across the cloud and on-premise. They need to maintain high reliability and uptime while keeping infrastructure costs as low as possible," says Gary Read, CEO of Boundary. "They also need their applications and services to perform amid security threats and network unpredictability. The latest version of Boundary is well-equipped to help IT organizations to more easily navigate these issues and help them find problems faster than ever before."
Boundary is also announcing limited availability for enhanced event collaboration features. Unlike traditional event consoles, the Boundary collaboration view allows IT operations staff to share information directly from within the event console, so that they don't lose the context of the issue. All information is automatically captured and stored for future reference. Boundary will also soon release the capability to set up advanced notification rules specifying whom should be notified when specific conditions occur. Employees will be able to receive notifications via email, voice, or SMS. Customers can also use their own proprietary notification systems such as PagerDuty.
Boundary allows customers to monitor their entire IT environments from a single point of control and is uniquely designed to deal with challenges stemming from modern, highly distributed applications. Boundary's best-in-class centralized IT operations monitoring and enterprise event management services centralize and correlate events, alerts and notifications from any source, enabling Ops/DevOps professionals to quickly see the total picture. Event management data is enriched by Boundary's ability to provide a real-time, all-the-time snapshot of the logical application topology. Boundary is privately held, based in Mountain View, and backed by Lightspeed Venture Partners and Scale Venture Partners. For more information on Boundary visit us on the web at www.boundary.com or on www.twitter.com/boundary.
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Oct. 1, 2016 08:00 AM EDT Reads: 1,307
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Oct. 1, 2016 08:00 AM EDT Reads: 2,243
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Oct. 1, 2016 07:30 AM EDT Reads: 1,173
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Oct. 1, 2016 07:00 AM EDT Reads: 2,397
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Oct. 1, 2016 07:00 AM EDT Reads: 1,865
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Oct. 1, 2016 06:30 AM EDT Reads: 1,931
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 06:15 AM EDT Reads: 808
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Oct. 1, 2016 06:00 AM EDT Reads: 1,945
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Oct. 1, 2016 06:00 AM EDT Reads: 2,806
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Oct. 1, 2016 05:45 AM EDT Reads: 1,342
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Oct. 1, 2016 05:30 AM EDT Reads: 642
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Oct. 1, 2016 05:15 AM EDT Reads: 1,438
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Oct. 1, 2016 05:00 AM EDT Reads: 4,758
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 04:45 AM EDT Reads: 580
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Oct. 1, 2016 04:30 AM EDT Reads: 1,825