This tutorial shows how to securely log on to Microsoft's Remote Desktop Connection application in a way that doesn't expose your credentials to public view. It then gives a complete example of how to use Alyvix Cipher and a private key to transform credentials into an encrypted string, and then using Alyvix Robot to automatically decrypt that string when it runs the test case.
“Thanks to the simulation of user interactions with our systems, we can guarantee high levels of service for our desktop-centric solution.”
Nerdio needed to measure latencies and end-to-end client performance from the user’s perspective. Alyvix helps them simulate user operations in common applications, enabling Nerdio to quickly identify any performance problems and fix them before Nerdio's customers encounter them.
"Already in the first week we have been able to restart four blocked applications or services, before our users would have even noticed the downtime."
The Internationales Bankhaus Bodensee needed a way to continuously verify that applications developed and hosted off-site were functioning. Würth Phoenix helped them set up Alyvix real user experience software to notify them when those applications went down.
"You can only be sure that the service is running by clicking through it."
The Südtiroler Gemeindenverband needed a new way to check their intranet was continuously responsive. Würth Phoenix helped them configure Alyvix to verify responsiveness and display the results over time in a way that anyone in the organization could easily track.
End user experience monitoring continuously tests the performance of business-critical applications from the perspective of end users. It quickly tells you about any degradation in performance, responsiveness, or availability that users may experience. This can help you avoid significant problems that can lead to poor customer satisfaction, lost revenue, and negative brand impact.
Real User Monitoring and Visual Monitoring are both user-centric strategies to ensure that quality metrics important to users are maintained. Their underlying methodology, however, is different, leading to a separate set of advantages and disadvantages for each approach. The proactive nature of visual monitoring can help you discover and remedy problems before users even notice them.