Monitoring Application Use with License Server Logs
نویسنده
چکیده
One feature of our campus-wide UNIX service is the wide selection of scientific and engineering applications such as AutoCad, Pro/ENGINEER, Maple, etc. We currently have 32 ‘‘major application packages’’ site licensed, representing an annual cost of almost $300,000. A number of the licenses were based on concurrent usage, so around budget time, people started to ask if we had an appropriate number of licenses. By adapting some previously developed software for tracking workstation use, we were able to determine who was using which applications, and concurrent usage information for these products and to reduce the number of concurrent users allowed to reflect actual use (plus some headroom). By applying these figures to just four applications, we were able to obtain a savings of $43,000 without cutting any service to our users. This paper discusses the methods we used to collect, process, and display this information, as well as some of the problems we encountered.
منابع مشابه
تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملA Survey of Web Log Data and their Application in Use-based Design
Web-based logs contain potentially useful data with which designers can assess the usability and effectiveness of their choices. Most guides to World Wide Web (Web) design derived from artistic or usability principles feature no empirical validation, while empirical studies of Web use typically rely on observer ratings. Several sources of unobtrusive usage data are available to Web designers, i...
متن کاملMonitoring BPMN-Processes with Rules in a Distributed Environment
In this paper, we demonstrate an application of rules in a business process scenario. As business processes, we consider data-intensive applications which need to move huge data files from server to server. By using the Business Process Model and Notation (BPMN) in our application, we enable clearly and hierarchically represented business processes. Such modeled processes can automatically be e...
متن کاملSimple Event Correlator for real-time security log monitoring
When it comes to the security of the IT system, event logs play a crucial role. Today, many applications, operating systems, network devices and other system components are capable of writing security related event messages to log files. The BSD syslog protocol is an event logging standard supported by majority of OS and network equipment vendors, which allows one to set up a central log server...
متن کاملCombining Structured and Unstructured Data for Web Application Performance Analysis
System performance analysis is typically conducted by collecting structured data in the form of metrics or by examining unstructured data in the form of logs. Tools currently available either analyze the structured data or the unstructured data, but not both. In some settings, this is not enough to make meaningful statements about the performance of the system. In this work, we explore alternat...
متن کامل