With the ever growing need and flexibility of Work from Home approaches, organisations need to ensure they consider additional capacity and requirements. A hot topic within the industry is application performance under less than ideal networking conditions. As a LoadRunner or Performance Center practitioner, you can help your team prepare for a remote workforce. Network Virtualisation is a free add-on capability which enables you to simulate realistic network performance characteristics. Executing a load test to model users connecting over varied (and potentially slow) internet and VPN connections will help you identify impacts or bottlenecks in the network or application configuration. Join our technical consultants in this webinar to learn how to effectively incorporate Network Virtualisation into your performance tests. We’ll also touch on how LoadRunner Cloud can help with burst capacity, and share how you can quickly set up some simple external monitoring in AppPulse, using your VUGen scripts. AGENDA • How to use Network Virtualisation to model “working from home” scenarios when using LoadRunner • How to burst capacity (or offload network traffic) using LoadRunner Cloud • How to use VUGen scripts for production application monitoring

Hora

03:00 - 04:00 hs GMT+1

Organizador

Micro Focus Application Delivery Management
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 751 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020
Jue 18 de Junio de 2020