Welcome!

Agile Computing Authors: Liz McMillan, Elizabeth White, Igor Drobiazko, Yakov Fain, Dana Gardner

News Feed Item

Boundary Announces Largest Release Ever, First to Deliver Unified Monitoring for Web Scale IT

High Frequency Application and Infrastructure Metrics Allow Customers to Be Notified on Issues That Previously Were Invisible, and Collaborate to Solve Them Before They Impact Users, Dramatically Improving the Availability, Performance and Success of Web-

MOUNTAIN VIEW, CA -- (Marketwired) -- 05/08/14 -- Boundary has released major new capabilities that will significantly help any organization running modern IT infrastructures to improve the performance and availability of their applications. With Boundary, organizations find problems that are simply invisible to other solutions, hidden in averages and one-minute sampling. Boundary's new release adds a wealth of server performance metrics to the solution, all delivered with one second resolution, giving unprecedented and instant visibility into how the infrastructure is affecting the application. Boundary is the only solution that brings together application health, infrastructure performance and events/configuration changes, all in context of real-time application topology and all in real-time. In addition, Boundary has released rich and flexible multi-channel notification capabilities, a new and powerful integrated collaboration function, and extended support for other event sources including SNMP, Syslog and email.

"Organizations are investing heavily to establish competitive advantages by deploying next-generation applications, infrastructure and processes, also known as Web-Scale IT, that may include technologies such as cloud, NoSQL databases, API-driven SOAs and processes such as Agile Development, DevOps, and Continuous Integration/Deployment. But they are discovering that legacy IT monitoring solutions are blind to the problems that arise rapidly and unexpectedly in these dynamic, highly distributed environments. Because of this, they are simply unaware of the warning signs that lead to outages and they often find out about issues from their customers," said Boundary CEO Gary Read. "With today's announcement, we have effectively made all previous monitoring tools redundant. They will soon be consigned to the history books of technology. Legacy IT monitoring tools are the slide rules to the Boundary digital calculator, totally defunct and obsolete. With users demanding highly responsive applications, attempting to depend on prehistoric once-a-minute or worse sampling periods for monitoring will cost you money, customers and probably your job."

As written by Gartner analysts Jonah Kowall and Cameron Haight in the December 6, 2013, Building a Modern APM Architecture for the World of Web-Scale IT, "The data collected by many conventional monitoring solutions lacks the granularity and contextual enrichment needed to improve Web-scale decision making."

"There is an acute and large market need for monitoring solutions like Boundary that deliver high frequency metrics across application health and infrastructure and events, and do so with full application context and topology," said Bernd Harzog, Analyst, Performance and Capacity Management - The Virtualization Practice. "Customers who are building modern applications just won't succeed in delivering high levels of performance and availability with the outdated monitoring tools and frameworks of the past."

All the metrics all the time
The first of the new capabilities enables Boundary to collect, process and provide insights into over 80 new metrics representing the performance of the server instances and the infrastructure and to do so on a second-by-second basis. This is in addition to its unique capability to collect the application flow data in real-time showing the health of the application. Boundary has cracked the code on being able to continuously collect an enormous amount of performance metrics with very low overhead and to process them all "in-stream," giving insights that are virtually real-time. This is critical for modern environments where DevOps needs to understand the outliers and anomalies that coarsely sampled data just cannot see. Boundary is also delivering a brand new anomaly detection capability that will allow customers to be auto-alerted to outliers for any metric by using minimum, maximum, average or sum at many different intervals from one second all the way to 12 hours.

Social collaboration meets IT Operations
Boundary also changes the speed and effectiveness of how teams work together to solve problems by delivering an embedded collaboration capability. Inspired by activity feeds popularized by Twitter and Facebook, Boundary lets users collaborate to resolve issues by exchanging messages inside Boundary, adding comments and knowledge to issues, and tracking each other's activity. Messages can be posted globally within the customer or can be associated directly with a specific IT event.

Boundary also makes it easy to track messages that involve specific users. With the collaboration view, they can mention other users with the familiar @username syntax popularized by Twitter. When a user is mentioned in a message they will be automatically notified both from within the Boundary user interface and externally via email in case they are not logged in.

Boundary also enables easy sharing of information during the troubleshooting process, by allowing users to quickly share links in the collaboration view. For example, a user may link to a run-book article that describes ways to resolve a specific issue. All messages and their links are archived for future reference and searching.

The right info to the right people at the right time in the right way
Boundary also includes a robust multi-channel notification capability integrated directly with its event management and monitoring. Boundary enables users to specify notification rules based a variety of criteria enabling different notifications to happen for different issues together with escalation paths when problems are not resolved. Teams are defined so that notifications are sent to different groups ensuring everyone relevant is copied on the issue. Once notified, the team can work on solving the problem together by using the collaboration capabilities, irrespective of where they are located.

Users also have the ability to customize how they want to be notified, whether by email, SMS and/or voice calls and messages can be automatically escalated based on user-defined rules. For example, an IT operator may want to be notified first by email and then by a voice call two minutes later if they don't acknowledge the email. This assures each person can choose the types of notifications that work best for him or her and reduces the likelihood of an important message being missed or lost.

Upon receiving a notification, users can acknowledge or close the event using any of the available communication protocols including SMS or voice. Acknowledging events is as simple as clicking a link or replying to a SMS message. Every acknowledgement is automatically updated in the Boundary event console.

"We are very excited about Boundary's new notification and collaboration capabilities," said Doug Miller, president and CEO at The Brightworks Group. "We just can't keep using old processes and tools in a new agile and changing environment. We need to be able to find, diagnose and solve problems in context, with relevant and real-time data at our fingertips. Boundary takes us from end-to-end with easy and modern collaboration."

Extended visibility for event management
A cornerstone of Operations is being able to correctly integrate, normalize, prioritize, correlate and provide visibility of the multitude of events that occur across different systems. Boundary's event management capability, which has been proven to scale to millions of events, now contains additional generic adapter options that include Syslog, SNMP and email adapters. Boundary provides customers with free access to its adapters and the library continues to grow as new contributions are made.

About Boundary
Boundary provides a Unified Monitoring solution for Web-Scale IT that allows customers to monitor their entire application infrastructure from a single solution and improve application availability and performance. It is designed to deal with the challenges stemming from modern highly distributed, cloud based applications by combining high frequency performance metrics collection and analysis with its unique understanding of the real-time application topology. Boundary is privately held, based in Mountain View, CA and backed by Lightspeed Venture Partners, Scale Venture Partners, Adams Street Partners and Triangle Peak Partners. For more information on Boundary visit us on the web at www.boundary.com or on www.twitter.com/boundary.

Boundary contact:
Kevin Wolf
TGPR
(650) 327-1641
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...
The paradigm has shifted. A Gartner survey shows that 43% of organizations are using or plan to implement the Internet of Things in 2016. However, not just a handful of companies are still using the old-style ad-hoc trial-and-error ways, unaware of the critical barriers, paint points, traps, and hidden roadblocks. How can you become a winner? In his session at @ThingsExpo, Tony Shan will present a methodical approach to guide the holistic adoption and enablement of IoT implementations. This ov...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
SYS-CON Events announced today that Stratoscale, the software company developing the next generation data center operating system, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere...
Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified – now it's a component-based well-performing framework. This immersive one-day workshop at 18th Cloud Expo, led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and the product company SuranceBay, will provide you with everything you wanted to know about Angular 2.
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...