Ensuring Affordable Access to Complete Usage Data ENH Records Improved Reporting with an Enhanced Debug Log.

Slides:



Advertisements
Similar presentations
The Premier Software Usage Analysis and Reporting Toolset LT-Live Community : A New Software-Publisher / Customer Relationship Paradigm.
Advertisements

Recruitment Booster.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
The Premier Software Usage Analysis and Reporting Toolset CELUG Presentation – May 12, 2010 LT-Live : License Tracker’s License Server Monitor.
July 2010 D2.1 Upgrading strategy Javier Soto Catalog Release 3. Communities.
Simple Format Easy to use Internet ready Visit our website at
The Premier Software Usage Analysis and Reporting Toolset Pay-Per-Use : Metering Software Usage Today’s Licensing Alternative.
Spillman Sentryx 6.0.
© 2011 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Kiran Kaja | Accessibility Engineer Ensuring Accessibility in Document Conversion.
Direct Congress Dan Skorupski Dan Vingo 3 December 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
The Premier Software Usage Analysis and Reporting Toolset Maximizing Value for Software Users.
October 17-18, 2006 l Santa Clara, CA Software Usage Analysis An Enabler for New Licensing Models Rick Ingram, President License Tracker Inc.
1 Enabling Secure Internet Access with ISA Server.
Site License Online Application Demo. Agenda Licensing Portal1 License Draw Down – All User4 License Draw Down – Super Users5 Contract Administration.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 Effectively Managing Global Engineering Licenses Kimberley A. Dillman IT Solution Architect – Engineering Delphi Corporation
Windows Vista: Volume Activation 2.0
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
What’s New in Sage SalesLogix Release Highlights Sage SalesLogix v7.5.4 delivers exciting new features, extensive usability enhancements and market-leading.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
GEORGIA ELECTRONIC CONVICTION PROCESSING SYSTEM 1 Georgia Electronic Conviction Processing System (GECPS)
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Primavera Highlights During COLLABORATE  Primavera Key Note: Making the Most of Your Oracle Primavera Investment Dick Faris, Primavera Co-Founder & Oracle.
systemhound © Raxco Software Belgium systemhound PC inventory software.
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
Hands-On Microsoft Windows Server 2008
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
NiagaraAX Framework Version 3.8 Feature Overview
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Citrix MPS 3.0 Licensing Douglas A. Brown President
Oracle Application Express. Program Agenda Oracle Application Express Overview Use Cases Key Features Packaged Applications Packaging Pricing Call to.
DireXions – Your Tool Box just got Bigger PxPlus Version Control System Using TortoiseSVN Presented by: Jane Raymond.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Reports and Learning Resources Module 5 1. SLMS Primary Administrator Training Module 5: Reports and Learning Resources 2.
Chapter 4: Working with ASP.NET Server Controls OUTLINE  What ASP.NET Server Controls are  How the ASP.NET run time processes the server controls on.
AMB HW LOW LEVEL SIMULATION VS HW OUTPUT G. Volpi, INFN Pisa.
 Registry itself is easy and straightforward in implementation  The objects of registry are actually complicated to store and manage  Objects of Registry.
Presented by Vishy Grandhi.  Architecture (Week 1) ◦ Development Environments ◦ Model driven architecture ◦ Licensing and configuration  AOT (Week 2)
 Shopping Basket  Stages to maintain shopping basket in framework  Viewing Shopping Basket.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
QC – User Interface QUALITY CENTER. QC – Testing Process QC testing process includes four phases: Specifying Requirements Specifying Requirements Planning.
TOPSpro Special Topics I: Database Managemen t. Agenda for Module I: Database Management  TOPSpro Backup/Restore Wizard  TOPS-TOPS Import/Export Wizard.
Document Module Features Streamlines the control, routing and revision process for critical documents and records Controls documents in any format (Excel,
Run-time RAM Usage File integrity checking RecipePlus Run-time file to application file conversion Enhanced language switching New FactoryTalk View ME.
E-ISuite Incident Business Workshop May 10, Implementation Review 2016 News and Updates.
© Synopsys IP Licensing Recommendations for P1735 Rev 4/16/12.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Working at a Small-to-Medium Business or ISP – Chapter 8
Program Management Portal (PgMP): What’s New in R8 for the Client
Customer Guide to Limited-Time Offer
Title Page The Art Of IVR.
Metrics Replication Presentation for Maryland Staff September 26, 2002
Securing the Network Perimeter with ISA 2004
IBM Start Now Host Integration Solutions
Wavestore Integrates…
Chapter 8: Monitoring the Network
LO4 - Be Able to Update Websites to Meet Business Needs
Configuration Of A Pull Network.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
SSDT and Database Project Basics
In-service Usage, Performance Monitoring & Management Service
In-house Developed Library Solutions
Latest Questions Answers PDF
Professional Services Tools Library (PSTL)
Presentation transcript:

Ensuring Affordable Access to Complete Usage Data ENH Records Improved Reporting with an Enhanced Debug Log

Motivation: SAM and Sources of Usage Data usage analysis is a critical element of a software asset management (SAM) program – provides information to enable many software business issue decisions license manager log files are the primary source of usage data – enterprise end users have little to no control over choice of license manager Flex is by far the dominant license manager in use today

Motivation: Flex Log Files the Flex license manager creates 2 log files – debug log ASCII, open text basic information only – no precise out/in matching – no license sharing details – no project information – no software version details – no token usage details – report log encrypted (closed), requires proprietary tools more complete usage information – no token usage details

Motivation: Goals complete – all necessary/desired information open – ASCII text – published specification can be validated – usable by ISVs for pay-per-use and compliance verification ease of deployment – fast deployment: daemon based not client based – ISV development effort must be low affordable – for ISVs: integration and licensing costs can not discourage implementation – for end users: analysis tools must be priced to make buy/develop decision easy

How It Works: Using Available Callbacks Flex ISV customers are provided callbacks they can use in their vendor daemons they can write whatever they want into the debug log during these callbacks the Enhanced Logging Initiative convened interested parties to define: – a common format for enhanced records to be written into the debug log – common source code for vendor daemon integration to write the enhanced records

How It Works: Registering ENH Functions to Callbacks if ISVs are already using callbacks – then add calls to ENH functions in the existing callback functions if ISVs are not using the callbacks – then register the ENH functions to the callback primary ENH functions – enh_init() called after lmreread determines duplicate grouping information from FEATURE lines in license files – enh_out() called in the pre-checkout filter writes an ENH_OUT record – enh_in() called in the pre-checkin filter writes an ENH_IN record

How It Works: Building an ENH Daemon add LTI provided source to daemon build environment (source tree and makefile) modify two files (enh_vendor.c and enh_vendor.h) to customize for the specific software vendor register or modify callbacks build -> test -> deploy approximate level of effort -> ½ day

How It Works: Enabling the ENH Daemon standard vendor daemon replacement process set environment variable _ENH_RECORDS=1

How It Works: Processing ENH Records ENH_OUT records (pre-checkout) – process subsequent “standard” debug records to determine checkout or denied queuing or update ENH_IN records (pre-checkin) – process subsequent “standard” debug records to determine linger or direct checkin

ENH Records: Basic Usage Logging Standard Fields FieldTypeDescription featurestringfeature name userstringuser logon ID hoststringhost name timestampstringmilliseconds since 00:00:00 Jan. 1, 1970 (UTC) formatted as.mmm num_licensesintnumber of licenses requested/returned session_handleinthandle assigned by the license server displaystringdisplay details addrstringIP address of user

ENH Records: Basic Usage Logging Advanced Fields FieldTypeDescription dup_groupstringduplicate grouping N - none S - site UHDV - user, host, display, vendor if V, then V: projectstringvalue of LM_PROJECT sw_versionstringversion of software checking out the feature lingerintlinger period, in seconds ENH_IN only

ENH Records: Basic Usage Logging Token System Fields FieldTypeDescription actual_featurestringname of actual software feature used for token feature checked out actual_feature_countintegernumber of licenses of the actual feature used

ENH Records: Basic Usage Logging, ENH_OUT & ENH_IN ENH_OUT – output during the pre-checkout callback – provides all additional information needed for a detailed OUT or DENIED hh:mm:ss (daemon_name) ENH_OUT: “feature” timestamp num_licenses session_handle “display” addr dup_group “project” “sw_version” “actual_feature” “actual_feature_count” ENH_IN – output during the pre-checkin callback – provides all additional information needed for a detailed IN, or detection of a “lingered” checkout hh:mm:ss (daemon_name) ENH_IN: “feature” timestamp num_licenses session_handle “display” addr dup_group linger “project” “sw_version” “actual_feature” “actual_feature_count”

ENH Records: Log File Integrity ENH_SECURITY – indicates that log file security is being used – indicates which digest technique is being used – output during the enh_init() function hh : mm : ss ( daemon_name ) ENH_SECURITY: “ digest_method ” ENH_DIGEST – provides data for post processing to ensure log file integrity – obfuscated with a vendor specific pass phrase – output whenever one of two conditions is met length of text in digest number of records in digest hh : mm : ss ( daemon_name ) ENH_DIGEST: “ digest ”

ENH Records: Other Records ENH_VERSION – mandatory – output during enh_init() – provides ENH Records specification version hh : mm : ss ( daemon_name ) ENH_VERSION: version ENH_VENDOR – optional – provides some information for ISV specific post analysis – output whenever vendor chooses, ignored by License Tracker hh : mm : ss ( daemon_name ) ENH_VENDOR: “ name ” “ value ”

What It Costs for ISVs – source code license -> $0 – source code royalties -> $0 – integration effort -> approx. ½ day – for ISVs using ENH records for pay-per-use licensing or for compliance validation, a license for the License Tracker toolset is required for enterprise end users – for ENH daemon -> up to ISVs, likely $0 – for License Tracker software no additional cost -> just another data source

“You can only optimize - what you understand… …and you can only understand - what you track!”