This tutorial shows how to securely log on to a Citrix Gateway in a way that doesn't expose your credentials to public view. It then gives a complete example of how to use Alyvix Cipher and a private key to transform a user name and password into encrypted strings, and then how to use Alyvix Robot to automatically decrypt those strings when it runs the test case.
This tutorial shows how to securely log on to Microsoft's Remote Desktop Connection application in a way that doesn't expose your credentials to public view. It then gives a complete example of how to use Alyvix Cipher and a private key to transform credentials into an encrypted string, and then using Alyvix Robot to automatically decrypt that string when it runs the test case.
“Thanks to the simulation of user interactions with our systems, we can guarantee high levels of service for our desktop-centric solution.”
Nerdio needed to measure latencies and end-to-end client performance from the user’s perspective. Alyvix helps them simulate user operations in common applications, enabling Nerdio to quickly identify any performance problems and fix them before Nerdio's customers encounter them.
End user experience monitoring continuously tests the performance of business-critical applications from the perspective of end users. It quickly tells you about any degradation in performance, responsiveness, or availability that users may experience. This can help you avoid significant problems that can lead to poor customer satisfaction, lost revenue, and negative brand impact.
Real User Monitoring and Visual Monitoring are both user-centric strategies to ensure that quality metrics important to users are maintained. Their underlying methodology, however, is different, leading to a separate set of advantages and disadvantages for each approach. The proactive nature of visual monitoring can help you discover and remedy problems before users even notice them.
The Alyvix visual monitoring system helps you proactively find problems that would lower the usability of your IT services by monitoring factors such as availability and responsiveness. By tracking the results over time, it can also detect worsening trends that may not otherwise be noticed. Here we describe two real world examples cases illustrating actual problems that occurred and how they were resolved.