Microsoft Dynamics AX 2012 plays an important role in the business activities of many companies. As a user-centered application, its performance from a user perspective is vital because of the many and wide-ranging types of employees who can't get their jobs down when it's not available and responsive.
We show how to build a test case to inspect and measure two common tasks within AX, filtering and detail inquiry, inside AX's Business Ledger. A related video in our YouTube channel gives detailed, step-by-step instructions on how to construct the test case described here.
Monitoring installations of Microsoft Dynamics AX 2012 from a user perspective is important because of the widespread use and importance of AX to business activities. We show how to build a test case to inspect and measure two common tasks within AX: invoice printing within Accounts Payable, and inventory control. An accompanying video in our channel provides further details for those wishing to construct a similar test case themselves.
You always monitor the systems and services you provide, especially your user-facing services. So why should your multi-factor authentication processes be any different? Use visual monitoring with Alyvix to regularly check that your MFA login procedure is running smoothly. We'll show you how to build a test case that logs you in to LinkedIn via 2FA, and logs you back out again. Feel free to modify it for your needs.
The Covid-19 epidemic had significant effects on Italians during the national lockdown this spring. It also resulted in significant, unpredictable effects on e-commerce throughout Italy, especially in terms of the physical delivery of packages. When web sites added slot-based reservation mechanisms to their ordering process to keep demand at sustainable levels, it turned out that Alyvix could be a big help.
This tutorial shows how to securely log on to a Citrix Gateway in a way that doesn't expose your credentials to public view. It then gives a complete example of how to use Alyvix Cipher and a private key to transform a user name and password into encrypted strings, and then how to use Alyvix Robot to automatically decrypt those strings when it runs the test case.
This tutorial shows how to securely log on to Microsoft's Remote Desktop Connection application in a way that doesn't expose your credentials to public view. It then gives a complete example of how to use Alyvix Cipher and a private key to transform credentials into an encrypted string, and then using Alyvix Robot to automatically decrypt that string when it runs the test case.