SlideShare a Scribd company logo
1 of 3
Add Automatic Exception Reporting To Your .Net Software - Allow End-
Users To Report Bugs Easily



Introduction

No matter how well you design and write your software, it is bound to encounter some errors or exceptions when
out in the wild - they are a fact of life in software development. Therefore, it is crucial when an error or exception
occurs on the end-user's site that you get to know about them. You must make it easy for the end-users to report
errors and exceptions to you. Further, the exception report must contain enough information so that you are able
to fix and resolve the cause of the problem.

Crypto Obfuscator's Automatic Exception Reporting functionality makes it extremely easy for you to catch any
unhandled exceptions that occur in your software and for your users to easily report these exceptions to you with a
single click of a button.



Contents Of The Exception Reports

The exception report prepared by Crypto Obfuscator contains the following information:


    •    Full stack trace info along with the values of all method arguments and local variables
    •    System information

    •    Miscellaneous info like the time of the exception, the build number, loaded assemblies, etc

    •    Optional developer defined custom data like log files, screenshots, etc.




Benefits of Automatic Exception Reporting

Automatic Exception Reporting helps you in the following ways:


    •    Increases the chances that the end-user will report the exception to you by making it very easy for them
         to send exception reports to you.
    •    Contains a variety of pertinent and useful information about the exception and its context.

    •    Decreases the turnaround time of your bug-fixing process.

    •    Increases customer satisfaction and sales.




The Exception Reporting Service

Crypto Obfuscator comes with a ready-to-use Exception Reporting Service to which your software can upload
exception reports to. The Exception Reports Viewer Dialog from Crypto Obfuscator allows you to download and
view exception reports sent by users to the service.



Exception Reporting Consent Form

It is advisable to provide a choice to your end-users whether they want to send the exception report to you or not.
To this end, Crypto Obfuscator can optionally show a consent form to the users of your software giving them the
option to report exceptions automatically to the exception reporting service. Alternatively, they can also save the
report to a file for sending at a later time. Users can also, if they so desire, provide their email address so that you
can get back to them when the issue is resolved.




The Exception Reporting Consent Form can also be changed to localize, customize or change its look, behavior and
functionality.



Automatic Exception Reporting SDK

The Automatic Exception Reporting SDK allows you to customize and extend the exception reporting functionality
in the following ways:


    •    Add custom data like log files, screenshots, etc to the exception reports.
    •    Perform custom handling when exception is raised - for example, you can send the exception report to the
         reporting service or save it to file using ready-to-use API, or let the default handling take place after your
         own custom handling.




Support Application Types

Automatic Exception Reporting can be used for all kinds of desktop applications including Windows Forms, WPF,
Console Apps, Windows Services, ASP.Net websites, web services, SharePoint Webparts, etc. It can also be used
for Silverlight and Windows Phone 7 apps.



Conclusion

Automatic Exception Reporting is a boon for software developers looking to deliver quality bug-free software to
their customers. It facilitates and increases the ease with which end-users can report bugs to you. At the same
time, it provides a lot of pertinent information which you can use to resolve the problem quickly and easily.
Automatic Exception Reporting can dramatically improve the customer satisfaction and sales of your software.

More Related Content

Similar to Add Automatic Exception Reporting To Your .Net Software - Allow End-Users To Report Bugs Easily

Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overviewgjuljo
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet newMichael Wang
 
Logger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions GuideLogger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions Guideprotect724rkeer
 
Webservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperWebservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperSigma Infosolutions, LLC
 
Web Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperWeb Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperSigma Infosolutions, LLC
 
ServiceNow Tokyo Release- Aelumconsulting.pdf
ServiceNow Tokyo Release- Aelumconsulting.pdfServiceNow Tokyo Release- Aelumconsulting.pdf
ServiceNow Tokyo Release- Aelumconsulting.pdfAelum Consulting
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management SystemIRJET Journal
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
Kovair ALM and DevOps Reports and Dashboards - Product literature
Kovair ALM and DevOps Reports and Dashboards - Product literatureKovair ALM and DevOps Reports and Dashboards - Product literature
Kovair ALM and DevOps Reports and Dashboards - Product literatureKovair
 
Gsx Monitor and Analyzer for SharePoint - Presented by Atidan
Gsx Monitor and Analyzer for SharePoint - Presented by AtidanGsx Monitor and Analyzer for SharePoint - Presented by Atidan
Gsx Monitor and Analyzer for SharePoint - Presented by AtidanDavid J Rosenthal
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxmccormicknadine86
 
IRJET - Banquet Hall Reservation
IRJET - Banquet Hall ReservationIRJET - Banquet Hall Reservation
IRJET - Banquet Hall ReservationIRJET Journal
 
IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1Banking at Ho Chi Minh city
 
Durable Streaming and Enterprise Messaging
Durable Streaming and Enterprise MessagingDurable Streaming and Enterprise Messaging
Durable Streaming and Enterprise MessagingSalesforce Developers
 

Similar to Add Automatic Exception Reporting To Your .Net Software - Allow End-Users To Report Bugs Easily (20)

Fault Analyzer for z/OS Overview
Fault Analyzer for z/OS OverviewFault Analyzer for z/OS Overview
Fault Analyzer for z/OS Overview
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overview
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet new
 
Logger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions GuideLogger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions Guide
 
Webservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and JasperWebservices Based Reporting Using Axis2 and Jasper
Webservices Based Reporting Using Axis2 and Jasper
 
Web Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and JasperWeb Services Based Reporting Using Axis2 and Jasper
Web Services Based Reporting Using Axis2 and Jasper
 
ServiceNow Tokyo Release- Aelumconsulting.pdf
ServiceNow Tokyo Release- Aelumconsulting.pdfServiceNow Tokyo Release- Aelumconsulting.pdf
ServiceNow Tokyo Release- Aelumconsulting.pdf
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management System
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
ServiceDesk Plus 8 Overview
ServiceDesk Plus 8 OverviewServiceDesk Plus 8 Overview
ServiceDesk Plus 8 Overview
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Kovair ALM and DevOps Reports and Dashboards - Product literature
Kovair ALM and DevOps Reports and Dashboards - Product literatureKovair ALM and DevOps Reports and Dashboards - Product literature
Kovair ALM and DevOps Reports and Dashboards - Product literature
 
How to Monitor IIS
How to Monitor IISHow to Monitor IIS
How to Monitor IIS
 
Gsx Monitor and Analyzer for SharePoint - Presented by Atidan
Gsx Monitor and Analyzer for SharePoint - Presented by AtidanGsx Monitor and Analyzer for SharePoint - Presented by Atidan
Gsx Monitor and Analyzer for SharePoint - Presented by Atidan
 
Leading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManagerLeading Indian IT Services Company uses OpManager
Leading Indian IT Services Company uses OpManager
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
IRJET - Banquet Hall Reservation
IRJET - Banquet Hall ReservationIRJET - Banquet Hall Reservation
IRJET - Banquet Hall Reservation
 
Application Server and Merchant Server Software suites
Application Server and Merchant Server Software suitesApplication Server and Merchant Server Software suites
Application Server and Merchant Server Software suites
 
IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1IBM MobileFirst Platform v7.0 POT Analytics v1.1
IBM MobileFirst Platform v7.0 POT Analytics v1.1
 
Durable Streaming and Enterprise Messaging
Durable Streaming and Enterprise MessagingDurable Streaming and Enterprise Messaging
Durable Streaming and Enterprise Messaging
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Add Automatic Exception Reporting To Your .Net Software - Allow End-Users To Report Bugs Easily

  • 1. Add Automatic Exception Reporting To Your .Net Software - Allow End- Users To Report Bugs Easily Introduction No matter how well you design and write your software, it is bound to encounter some errors or exceptions when out in the wild - they are a fact of life in software development. Therefore, it is crucial when an error or exception occurs on the end-user's site that you get to know about them. You must make it easy for the end-users to report errors and exceptions to you. Further, the exception report must contain enough information so that you are able to fix and resolve the cause of the problem. Crypto Obfuscator's Automatic Exception Reporting functionality makes it extremely easy for you to catch any unhandled exceptions that occur in your software and for your users to easily report these exceptions to you with a single click of a button. Contents Of The Exception Reports The exception report prepared by Crypto Obfuscator contains the following information: • Full stack trace info along with the values of all method arguments and local variables • System information • Miscellaneous info like the time of the exception, the build number, loaded assemblies, etc • Optional developer defined custom data like log files, screenshots, etc. Benefits of Automatic Exception Reporting Automatic Exception Reporting helps you in the following ways: • Increases the chances that the end-user will report the exception to you by making it very easy for them to send exception reports to you. • Contains a variety of pertinent and useful information about the exception and its context. • Decreases the turnaround time of your bug-fixing process. • Increases customer satisfaction and sales. The Exception Reporting Service Crypto Obfuscator comes with a ready-to-use Exception Reporting Service to which your software can upload exception reports to. The Exception Reports Viewer Dialog from Crypto Obfuscator allows you to download and view exception reports sent by users to the service. Exception Reporting Consent Form It is advisable to provide a choice to your end-users whether they want to send the exception report to you or not. To this end, Crypto Obfuscator can optionally show a consent form to the users of your software giving them the
  • 2. option to report exceptions automatically to the exception reporting service. Alternatively, they can also save the report to a file for sending at a later time. Users can also, if they so desire, provide their email address so that you can get back to them when the issue is resolved. The Exception Reporting Consent Form can also be changed to localize, customize or change its look, behavior and functionality. Automatic Exception Reporting SDK The Automatic Exception Reporting SDK allows you to customize and extend the exception reporting functionality in the following ways: • Add custom data like log files, screenshots, etc to the exception reports. • Perform custom handling when exception is raised - for example, you can send the exception report to the reporting service or save it to file using ready-to-use API, or let the default handling take place after your own custom handling. Support Application Types Automatic Exception Reporting can be used for all kinds of desktop applications including Windows Forms, WPF, Console Apps, Windows Services, ASP.Net websites, web services, SharePoint Webparts, etc. It can also be used for Silverlight and Windows Phone 7 apps. Conclusion Automatic Exception Reporting is a boon for software developers looking to deliver quality bug-free software to their customers. It facilitates and increases the ease with which end-users can report bugs to you. At the same
  • 3. time, it provides a lot of pertinent information which you can use to resolve the problem quickly and easily. Automatic Exception Reporting can dramatically improve the customer satisfaction and sales of your software.