Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] abandoned shopping carts abandonment accelerators SSL access links, passive monitoring accountability accuracy root-cause analysis ACE (Application Characterization Environment) actions automated responses. [See also automated responses] activation of management tools activation/deactivation time active collection 2nd active collections linkage active customers active measurements active monitoring activity baselines adaptability instrumentation adaptive instrumentation addresses IP agents passive monitoring aggregate behavior aggregation incremental 2nd aggregation intervals measurement 2nd aggregators monitoring alarms de-duplication alarms. [See also alerts] alerts coordinating event management 2nd reducing noise 2nd prioritization of processing raw reliability trip wires 2nd verifying algorithms slow start alters filtering analysis FMEA process managers root-cause statistical 2nd API (application programming interface) Application Characterization Environment (ACE) application program interface (API) application servers applications baselining development teams interactions between operations 2nd existing infrastructure managing 2nd instrumentation 2nd legacy opacity of management effect of organizational structures instrumentation 2nd metrics 2nd operational environments time lines transaction response time 2nd management systems integration 2nd Netuitive network-aware ProactiveNet 2nd Arbor Networks architecture design drivers 2nd environment evolution 2nd heterogeneous systems 2nd example of 2nd instrumentation policies 2nd servers infrastructure 2nd 3rd 4th SNA Web service delivery 2nd Web services architetcure Web management systems 2nd arrival rates artifact reduction artifact reduction techniques artifacts alerts correlation eliminating reducing assessment headroom local impact association of correlation between services associations asymmetric routes Asynchronous Transfer Mode (ATM) ATM (Asynchronous Transfer Mode) attacks Arbor Networks DDoS automated defenses SYN Flood attributes objects policies audio auditing policies authentication authoritative DNS servers automated defenses automated operation automated responses 2nd automation policy-based management 2nd architecture 2nd design 2nd elements 2nd need for 2nd products 2nd service-centric 2nd availability 2nd ROI transport services |