Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Use embedded AI to find performance problems

The root cause of a performance transaction can be complex to troubleshoot, but it does not have to be. By using AppDynamics’s built-in machine learning capabilities, we can quickly identify Health Rule violations triggered by transaction response times deviating from their baseline and then combine those with diagnostic capabilities that get us to the specific cause. We are able to drill down into the relevant snapshots to see which method and specific line of code is to blame.

Troubleshooting Unknown Unknowns with the Tier Metric Correlator

Tier Metric Correlation allows for fast root cause analysis by tying together business transaction performance outliers, nodes/servers, and key metrics that indicate a path to problem identification. In this example, we navigate through a blue/green deployment to identify a broken pipe/database issue. From here, we can drill down into the call graph and root cause.

Configure a policy to detect and block attacks and exploits

With Cisco Secure Application, you can configure run-time policies to continuously monitor vulnerabilities and automatically find and block attacks. Your speed and uptime are maximized while the risk to your business is minimized. And your teams gain time to plan and remediate your environment.

Understanding Mobile User Journeys

Ensure each user has the best and most optimal mobile experience possible by understanding mobile user journeys. Bring teams together to understand how a user interacts with the mobile application in order to streamline operations and improve their experience. By leveraging data collectors, teams can gain an even deeper understanding of specific items in a shopping cart that was lost, for example, and their associated revenue. This information helps build a conversion chart giving the business an indication of how severe the problem may be to then help prioritize remediation efforts.

Using data collectors to compare a new feature

Leverage AppDynamics analytics to determine how a new feature introduced within an application proves to be an improvement or degradation. By creating and leveraging data collectors to look for a specific flag in a release, a new parameter or attribute, that indicates whether a feature is enabled, one can quickly gain insights as to whether there has been a performance improvement.

Identifying memory leaks with automatic leak detection

Proactively identify memory leaks that occur in production environments that cause performance issues by using Automatic Leak Detection. See how automated capabilities can assist teams with detecting and diagnosing these types of common issues before the application performance or customer experience is impacted, adversely affecting the business.

Bi-directional Integration of Cisco AppDynamics and Cisco ThousandEyes

Get full visibility into every facet of your customer's digital experience What if you could see everything that impacts your digital supply chain—from the code to the infrastructure to the network and everything in between? With AppDynamics plus ThousandEyes - you can.

Deliver exceptional digital experiences with Cisco Cloud Native Application Observability

From the application layer down to your Kubernetes® infrastructure, Cisco Cloud Native Application Observability delivers cross-domain visibility with correlated MELT data and AI/ML-driven insights to simplify the complexity of observing the performance of modern applications, multi-cloud Kubernetes, and hybrid cloud infrastructure.

Diagnosing SAP performance issues with AppDynamics Snapshots

AppDynamics monitors every execution of a business transaction within an application that has been instrumented, either using our agents or through OpenTelemetry. Both Business Transaction and Process Snapshots capture the details necessary for gaining a deeper understanding of method call performance...answering questions like, what line of code is taking the longest to run?

Cloud Native Application Observability - Sensitive Data Masking for logs

Masking sensitive data in logs is crucial for ensuring the protection and privacy of sensitive information. If exposed, personally identifiable information (PII), financial details, and healthcare records pose significant risks. By masking this data in logs, organizations can prevent unauthorized access, comply with data protection regulations, mitigate insider threats, reduce the attack surface for potential breaches, and enable effective auditing and investigation without compromising sensitive information.