Transcript: We first cover the overview of memory dumps, debuggers and logs, then information collection via scripts, then information extraction via checklists, then problem identification using patterns, and finally, problem resolution.

Comment: Information extraction via checklists and problem identification using patterns can also be applied to software trace analysis, for example, to ETW (Event Tracing for Windows) / CDF (Citrix Diagnostic Facility) trace analyis, MessageHistory, MSI, XenApp, XenDesktop and XenServer log analysis, and Process Monitor trace analysis.

- Dmitry Vostokov @ Citrix Blogs –

Follow me on Twitter and connect with me on LinkedIn.