Intelligent Log Analyzer. André Restivo
|
|
- Isabella Alexia Wilson
- 8 years ago
- Views:
Transcription
1 Intelligent Log Analyzer André Restivo 9th January 2003
2 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines. In larger systems these logs can become too large to inspect manually so some tools have been developed to aid the Server Administrator in this task. Most of these tools force the server administrator to define what he is expecting to find in the logs if everything is working correctly, and report all the lines that don t match what was defined as normal. This means that a enormous effort must be put into configuring these kind of log analyzers. This report tries to define a different kind of log analyzer, one that doesn t need a big setup effort and that can learn what is and what isn t normal as it inspects the system logs.
3 Contents 1 Introduction Objectives Motivation State of the Art Concept Clustering Pre-processing Event Matching Cluster Format Analysis Statistical Analysis Alarm Reporting User feedback System Design Architecture Modules Log Supplier Pre-Processor Clustering Matching Alarm Reporting User Feedback Conclusions and Future Work Possible Improvements
4 3.1.1 Clustering and Matching Statistical Analysis Persistence Conclusions
5 List of Figures 2.1 Log Supplier Class Diagram Pre Processor Class Diagram Clustering Module Class Diagram Matcher Module Class Diagram Clustering Failure Example
6 Chapter 1 Introduction 1.1 Objectives The main objective of this work is to prove that it is possible to implement an alternative to the current log analyzers. This log analyzer should be easy to use and should work in any kind of system without any modification. It isn t in the scope of this project to create a fully functional application but to prove that such application is viable. This will enable the completion of the project in its projected time frame and can provide a solid base for a future work in this area. 1.2 Motivation During my professional life I often have contact with people that have to manage somewhat complex server systems. These system are normally composed of several machines, each one of them writing around 3000 lines of logs per minute. It somewhat confuses me that not much is done with these enormous quantity of information. Normally these logs are only inspected when a problem arises when, in mine point of view, they should be used in a more pro-active way, trying to find that something is not right before it is noticed. The main reason system administrators don t inspect this system logs is the same reason why they are so important. The quantity of information is so big there isn t any possibility 4
7 an human can go through all of it. This leaves us with two possibilities, either disregard the logs completely untill something breaks or use some kind of tool to help us in this task. Several log analyzer tools exist but unfortunately they normally have either a very time consuming setup phase or are made for a specific application log. This creates some space to a different kind of log analyzer, one that needs to know very little about the system he is working on and that learns with historical data, removing the initial setup work from the system administrator. In this way we hope that more system administrators start using the information present in their system logs in a more productive way instead of using them just to find out what went wrong. 1.3 State of the Art A quick search on the web for log analyzer tools will render an enormous quantity of links and information. If you look a little further into the tools presented you will see that they all belong to one of these categories: Analyzers for one specific product.the most known example is webalizer, a web server log analyzer. These kind of applications are oriented towards one specific product. Analyzers where the user has to specify what he is looking for. An example of these kind of log analyzer is the swatch package. To use this analyzer the user has to specify which log files he wants to monitor and has to pick some regular expressions that match the log events he wants to be warned about. This approach has two problems: It has a very time consuming setup phase and it doesn t consider problems that were never seen by the system administrator (because if he has never seen them he can t specify a regular expression for them). This, of course, opens space for a different type of log analyzer that has the best of the two worlds. This is, a log analyzer that has a simple setup, works with any kind of log and expects the unexpected. 5
8 1.4 Concept Log files normally consist of a series of lines. These lines are commonly known as events and describe an action that happened on the system. These actions can be of many types, for example: a mail that was sent, someone that logged in the machine, the machine rebooted, someone accessed a web page,... A human can easily group these events by similarity as each type of event always has the same structure with only some tokens changed (we will refer to these event groups as clusters from now on). If a log analyzer could also do this type of grouping it could already do some type of statistical analysis, checking for new event types and for events that suddenly changed their frequency. This type of analysis can be seen as finding strange behaviors in the log file. This approach could easily detect problems like, for instance, a recurrent process that suddenly stopped to run, or a strange increase in failed login attempts. But there is more we can do. If we look into each event cluster we will see that there are some tokens that are often different from one event to the other, while other token remain the same. The tokens that change (that we will know refer to as Variants), could also be the subject of a statistical analysis. In this way each variant would be composed by a set of alternatives, each alternative can be analyzed separatedly. By doing this kind of analysis we could find problems like for instance an user that had never logged in to the machine that is loggin in for the first time. Of course this seems all very easy but if you were paying attention you would have noticed that we said humans could easily group these kind of events. So this is our first problem, how to group events into clusters automatically without having to tell the application which kind of events we are expecting Clustering Clustering, at first glance, seems to be the most difficult aspect of this whole idea. A first approach would be to group events that have a big set of common tokens between them. This would work great if all events were like this: 6
9 User arestivo logged in at 15:06 12/04/2002 from the following IP This kind of log event would have a lot of invariant tokens that would enable us to easily match it to another similar event. Unfortunately not all events are like this one. For instance events like these: GET GET In this case a human can easily spot they are of the same type but for a machine using the approach we have mentioned before they seem completely different types of event. The reason the human had a better performance in this example is that the human was able to identify the second token of each event as being an URL. The human s mental structure for this example will be something like: GET {URL1} GET {URL2} Now its easy, would say the machine! This means that we need some kind of action that transforms the first set of events into the second set. We will call this the pre-processing phase Pre-processing It s not easy at all for a computer to have the kind of behavior we are looking for, without having some knowledge of the system he is working on. For this reason we have chosen to slightly bend the objectives that we have proposed to achieve. This means that some kind of information about the kind of logs the application is analyzing must be given. The idea is to create a set of rules composed by a regular expression and the name of what that regular expression represent. For instance if we know our logs have dates in the following form, dd/mm/yyyy, we could insert the following rule: \d\d/\d\d/\d\d\d\d - DATE This will of course be much less time consuming than writing a regular expression for all events that we want to be informed of. Other common rules that could be used would be rules for: addresses, URLs, time, error codes,... 7
10 1.4.3 Event Matching We now have our events in a much easier format to work with. This doesn t mean that the problem of matching events as being of the same cluster is a easy job. In fact it is still very complicated to determine if two logs are of the same type. Several algorithms can be used to perform this task. Just to mention a few: Using the Levenshtein Distance between strings Counting the number/percentage of common tokens Counting the number/percentage of common characters Counting the number/percentage of variants that would be found if we would merge the two events... As we can see an enormous number of algorithms can be used to perform this task. Besides that each algorithm can be fine tuned by changing internal thresholds. The approach we will use will take all this into consideration. We will use several algorithms and give to each one of them an initial weight. Each algorithm will be queried about the similarity of two events. The result obtained will be weighted using each algorithm specific weight factors. A global answer will be generated. Algorithms who s answer is closer to the global answer will see their weights increased while algorithms that failed to answer correctly will see their weight in the final answer diminished. Besides that, each algorithm will be informed of its performance. This will allow it to fine tune its internal thresholds. This kind of unsupervisioned, or self-supervisioned, learning approach its often called coevolution Cluster Format Analysis After grouping events in clusters we also have to find out each cluster s format. This mean that we have to find which are the invariant tokens and which are always constant. When 8
11 we first form a cluster we start with a single event. This happens when we have an event that doesn t fit in any of the existing clusters. At that time the cluster format is obvious as their aren t any invariants to be spotted yet. As the second event arrives we can just run through each of the event s tokens and compare if they are equal. If they are then we have found a invariant token, if they are different then we found a variant. It s not really as easy as it seems. When we find a variant some kind of synchronizing between the two events must be performed. We will discuss the algorithms behind this process later Statistical Analysis As we have mentioned before we can do some kind of statistical to both clusters and variant alternatives. The system being developed will only do some frequency analysis. These analysis will try to find events or parts of events that violate what is considered normal for that event. The idea is to save the maximum and minimum distance reported between events of the same type. If an event starts appearing more quickly that it used to an alarm is generated, on the other hand if an event fails to appear when expected another kind of alarm is generated. We have to be extra careful with this type of analysis. As we have seen before we want this type of system to remove some of the work the user has when analyzing or setting up an analyzer. So we can t flood the user with lots of alarms. This can be solved in the following ways: Have an initial training phase where the analyzer will learn what is and what isn t normal. This phase will be similar to the production phase but with alarms disabled. Allow some monitoring for a new kind of event before reporting alarms for it. For instance if a new application is installed we don t want to start sending alarms for each new event type in the event log. Don t send more than one alarm for each kind of event without having the user give feedback about that alarm. 9
12 Allow some tolerance when doing the statistical analysis. This tolerance should be easily modified by the user. On the other hand we could have alarms failing to be reported because during the training phase a certain event frequency threshold was violated. This can be solved by having the maximum and minimum frequencies slowly approaching each other Alarm Reporting Besides generating alarms we also have to find a way of reporting them to the users. As we don t want to force the user to constantly check for new alarms, the easiest solution is to send the alarms in the form of s. Most reading application have some kind of warning system that tells the user a new as arrived. An advantage of this solution will be that getting some user feedback can be easily implemented by sending some clickable links in the message User feedback User feedback to the alarm reports is the only way the user can what kind of alarms he receives. As we have seen this feedback will be made by selecting links on the alarm reports received by . These feedback links can be the following: Don t send me more alarms for this cluster Don t send me more alarms for this variant Don t send me more alarms for this variant alternative Increase or Decrease the tolerance for this alarm type This was a Major/Minor/Warning alarm These are just the more basic feedback links to be included. More feedback alternatives will probably be identified as soon as the system is more mature. 10
13 Chapter 2 System Design After seeing what kind of system we want it s now time to see how it will be implemented. In this chapter we will talk about the various modules that are part of the analyzer and talk about the system global architecture. 2.1 Architecture As we have already mentioned large systems usually have more than 3000 events for second in each machine. This mean that performance is a big issue when trying to implement a log analyzer, specially because we dont want to affect the system s performance disturbing it more than we are helping. To try to minimize the impact on the computer s performance the system was designed in order to be easily distributed across different machines. Several different modules where designed without having any restrictions on the machine they would be working on. As this is merely a protype we opted to implement the system in Java and use RMI for communicating between the various modules. If we can prove this kind of system can work we can shift the system into a more performance oriented language like C or C++. 11
14 2.2 Modules As mentioned before the application will be composed from several modules. Each of this modules will process some data and store them in a buffer. While the buffer isn t full it will continue to process more data. The following module in the event chain will retrieve the processed events from the module and if nothing to retrieve is present then it will wait for a notification that new processed events are ready. We will now see which modules exist and what each one of them is responsible for Log Supplier Before starting processing the log files we first must retrieve them. The reason we have chosen to make this a separate module is that it will be easier if for some reason we want to change the way logs are gathered (for instance retrieve them via FTP instead of reading them from the local system). Another advantage of this approach is that it will enable the possibility of retrieving logs from separate files or even from separate machines. To prevent a continuous access to the hard drive this module, as most of the others, will have an internal buffer where log events are stored before being sent to the next module. <<Interface>> LogSupplier SimpleLogSupplier Figure 2.1: Log Supplier Class Diagram Pre-Processor The Pre-Processor module will connect to any existing Log Supplier, and apply a set of rules. These rules are read from a file upon startup and consist of a regular expression and a keyword. The application will then match each log event to each regular expression and 12
15 if a match succeeds it will substitute the matched tokens by the specified keyword. For example, this log: 11/05/ :05 Mail sent to user@somewhere.com Would be transformed into DATE TIME Mail sent to <<Interface>> LogSupplier <<Interface>> LogConsumer LogPreprocessor Figure 2.2: Pre Processor Class Diagram Clustering The Clustering module will be one of the most important modules. It will also be a Log- Consumer, being able to read Log Events from any Log Supplier, be it a Log Pre-Processor or a Log Reader. For each log received it will begin by trying to match it to an existing cluster. It will start by calculating the distance between the received Log and each one of the existing clusters. To calculate this distance it will use the Matching module that we will see in detail next. If the nearest Cluster is closer than a pre-defined threshold then it will add this Log Event to that Cluster, if it isn t then it will create a new Cluster having only that new Event. To add a Log Event to an existing Cluster, the Cluster Manager will have to merge the current Log Cluster format with the new Event. This merging operation will work in the following manner (this is a simplified version of the algorithm): 1. Let s1 and s2 be pointers to each strings first token 2. While not finished do { 13
16 3. If s1 and s2 point to the same token then add that token to the final result and increment both pointers. 4. Else Try to find the token pointed by s1 in the remaining of the second string and vice-versa 5. If found then add the token between s2 and the position the token was found as a new Variant. If a Variant already existed then add it as a new Alternative. Assign the token s position to s2 and increment s1. 6. If not found then add the token at s2 as a new Variant. If a Variant already existed then add it as a new Alternative. Increment both pointers. 7. } For example if we have something like: A B {VARIANT1} C D E A B H C F G D E Then we would start by having s1 and s2 pointing to the token A, while the tokens pointed by both are the same we would just add the pointed tokens to the final result. Thus we would have the final result equal to A B. As soon as we get a mismatch between the two pointers we would have two look for each token in the other string. We wouldn t find them and so we would add a Variant to the final result and, as in that position a Variant already existed we would add H as an Alternative of the already existing Variant. We would resume with token C and when we reached D and F we would have another mismatch. This time we would find the letter D in the second string so we would add another Variant to the final result and add F G as an alternative. At this moment the final result would be A B {VARIANT1} C {VARIANT2}. We would resume with token D and wouldn t find any other mismatches till the end. Thus our final result would be A B {VARIANT1} C {VARIANT2} D E and we would have H as a new Alternative to Variant 1 and F G as the first Alternative to Variant 2. Both Cluster Log and Alternatives will be the objects that we will analyze statistically. In that way they will implement the Alarmable interface, meaning Alarms can be raised 14
17 referring them. They will also have Statistical information for each one of them. This statistical information will have data about the maximum and minimum frequencies the objects appeared and also a counter for the number of events where they were found. Three types of Alarms can be generated by these Objects: First Event alarms, when an Alarmable Object is first spotted. Minimum Frequency Threshold Alarms, when an Alarmable Object starts appearing with a lesser frequency that it was usual. Maximum Frequency Threshold Alarms, when an Alarmable Object starts appearing with a bigger frequency that it was usual. This last Alarm types are the most difficult to detect because they aren t generated by the existence of a new Event but by the lack of one. This means that each time an event is generated we would have to check if any of the existing Alarmable Objects has crossed the Maximum Frequency Threshold. Of course this would be too time consuming. The solution is to have all the Alarmable Objects ordered by the next possible Maximum Frequency Threshold Alarm and only verify the first few of this objects. <<Interface>> LogConsumer <<Interface>> Alarmable ClusterManager 1 Statistics n ClusterLog 1 n Variant 1 n Alternative Figure 2.3: Clustering Module Class Diagram Matching Finding out if two separate events belong to the same cluster is also a difficult task to accomplish. The main difficulty is that lots of possible algorithms exist and each one of them 15
18 seems to be better suited to a specific log format. We decided to use this difficulty in our favor by using as much algorithms as possible and letting them help each other in evolving. We did this by defining a single Match Manager. This Manager would be the responsible for deciding how much did a particular event fit on a certain Cluster. The Match Manager would have several other Objects, called Matchers, able of doing the same type of work. It would start by having the same degree of confidence in each one of them, and as they would answer to its queries it would change the degree of confidence it had on each one of them (based on the answers received). In this way it would be able to do a weighted sum of all the Matchers and return that sum as the result. Besides altering the degree of confidence in each Matcher, the Manager would also inform them of their performance. In that way, each one of them would be able to adjust its internal parameters. This type of cooperation between several algorithms is often called co-evolution. MatcherManager <<Interface>> Matcher Matcher1 Matcher2 Matcher3 Figure 2.4: Matcher Module Class Diagram Alarm Reporting An important part of the application will be the actual Alarm reporting. Besides sending the alarms to the user this module will also be responsible to filter them. This will prevent that the user gets flooded with too much alarms. Some rules that will be implemented are: 16
19 Don t send alarms while in the Training Phase Don t send more than one alarm for each Alarmable object untill the user gives feedback about the last alarm (eventually allow untill 5 alarms at a time and warn the user whenever he forgets to give feedback for too long). Don t send statistical alarms untill enough information about the Alarmable object is gathered. Alarms will be sent using s.. This module will also be responsible of constructing the alarm messages, including all the event information, alarm type and feedback links User Feedback The User Feedback module will be the only way the user has to configure the way the system behaves. Along with the alarm text, the user will receive a set of links that he can click to alter the alarm behavior. When the user clicks a feedback link he will be sent to a web page informing him that the feedback information has been received. The same webpage will record the feedback information in a database that is constantly monitored by the User Feedback module. In that way the Feedback module will be able to use that information to change several internal parameters. 17
20 Chapter 3 Conclusions and Future Work 3.1 Possible Improvements As stated in the objectives section, the scope of this project was to create a prototype for a new type of log analyzer based on the statistical analysis of events. This prototype has, of course, room for a lot of improvements Clustering and Matching The main modules of the application are the Clustering and Matching modules. In these two modules lies the heart of the analyzer. Both modules have a lot o possible improvement possibilities. At this moment clustering is done by joining a new log event with the most similar of the existing clusters. If all clusters are too different from the log event being analyzed a new cluster is created. This can create two problems: A log event can be assigned to a cluster and later a better cluster can appear. Figure 3.1 is a good example. Notice how the first 4 events seemed to make a good cluster but as soon as more events arrived we can clearly notice 2 different clusters. As clusters grow they might start touching each other and it might be a good idea to merge them. 18
21 Figure 3.1: Clustering Failure Example The first of this two problems seems to be the most complicated to solve as it would require the analyzer to remove a log event from a cluster. That would mean saving a lot more information about each alternative and a lot more processing. The matching of two Log Events can also suffer some improvements, namely implementing new algorithms. New algorithms could even be based on genetic algorithms or neural networks as each algorithm receives information about its performance that could be used to train this kind of algorithms Statistical Analysis At this moment only some simple statistical analysis are performed. It shouldn t be hard to come up with new useful analysis concepts and incorporate them in the application. Some ideas might be: Do some numerical analysis instead of treating all the Alternatives as text, try to identify which ones are numerical and do some kind of trend analysis on them. Try to find out which words are sign of alarms and apply that knowledge on other clusters. Do a more elaborate analysis than just testing maximum and minimum frequencies Persistence In the real world a log analyzer that learns with historical data such as this one doesn t have much use if it isn t capable of saving it s own state. As this is only a prototype not much 19
22 effort as been put into turning the system persistent. The most logical approach seems to be to use a relational database to save the internal state between system runs. 3.2 Conclusions As the result of this project a prototype as been developed. The feedback module as not yet been implemented but all the other modules are functional. The matching and clustering module are working much better than expected but some work still needs to be done in the event merging function. The amount of Alarms generated is still overwhelming but without extensive tests and training we can t get a clear conclusion about the usability of the system. We have proposed to show that it was possible to create a log analyzer without any knowledge of the logs domain. By trying to match similar events and join them in clusters, merge them and try to extract a common format for each cluster, we were able to analyze statistically the retrieved information. An arquitecarchitectureture for this log analyzer has been proposed and explained in detail and a prototype as been developed. The results achieved show that it is possible to use this kind of technique in log analyzing although a lot of work still needs to be done to make this possible in real time. 20
23 Bibliography [1] Brad Dolin, Forrest H Bennett, III and Eleanor G. Rieffel Co-evolving an effective fitness sample Proceedings of the 2002 ACM symposium on applied computing [2] Andrew B. Williams and Zijian Ren Agents teaching agents to share meaning Proceedings of the fifth international conference on Autonomous agents, 2001 [3] Haixun Wang, Wei Wang, Jiong Yang and Philip S. Yu Clustering by pattern similarity in large data sets Proceedings of the 2002 ACM SIGMOD international conference on Management of data [4] Ronald Feldman Mining Unstructured Data Tutorial Notes San Diego,
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationOracle Database Performance Management Best Practices Workshop. AIOUG Product Management Team Database Manageability
Oracle Database Performance Management Best Practices Workshop AIOUG Product Management Team Database Manageability Table of Contents Oracle DB Performance Management... 3 A. Configure SPA Quick Check...6
More informationEfficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
More informationOffline Payment Methods
Offline Payment Methods STRONGVON Tournament Management System 1 Overview The STRONGVON Tournament Management System allows you to collect online registration, while arranging for offline payment methods
More informationGuideline for stresstest Page 1 of 6. Stress test
Guideline for stresstest Page 1 of 6 Stress test Objective: Show unacceptable problems with high parallel load. Crash, wrong processing, slow processing. Test Procedure: Run test cases with maximum number
More informationHow To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
More informationAnglia IT Solutions Managed Anti-SPAM
By Appointment to Her Majesty The Queen Supplier of IT Products and Support Anglia IT Solutions Limited Swaffham Anglia IT Solutions Managed Anti-SPAM A Simple Guide All Rights Reserved. This document
More informationHands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
More informationProduct Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle Introduction I ve always been interested and intrigued by the processes DBAs use to monitor
More informationHelpdesk manual. Version: 1.1
Version: 1.1 Date: 06-May-2014 Introduction Once a new system has been delivered, or an update has taken place, issues could occur, questions raised and new functionality needed. You can register these
More informationPROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
More informationSEO AND CONTENT MANAGEMENT SYSTEM
International Journal of Electronics and Computer Science Engineering 953 Available Online at www.ijecse.org ISSN- 2277-1956 SEO AND CONTENT MANAGEMENT SYSTEM Savan K. Patel 1, Jigna B.Prajapati 2, Ravi.S.Patel
More informationHandling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2
White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationIriScene Remote Manager. Version 4.8 FRACTALIA Software
IriScene Remote Manager Version 4.8 FRACTALIA Software 2 A. INTRODUCTION...3 B. WORKING DESCRIPTION...3 C. PLATFORM MANUAL...3 1. ACCESS TO THE PLATFORM...3 2. AUTHENTICATION MODES...5 3. AUTHENTICATION
More informationClub Accounts. 2011 Question 6.
Club Accounts. 2011 Question 6. Anyone familiar with Farm Accounts or Service Firms (notes for both topics are back on the webpage you found this on), will have no trouble with Club Accounts. Essentially
More informationIntegrating a web application with Siebel CRM system
Integrating a web application with Siebel CRM system Mika Salminen, Antti Seppälä Helsinki University of Technology, course Business Process Integration: Special Course in Information Systems Integration,
More informationInternet Filtering Appliance. User s Guide VERSION 1.2
Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of
More informationOptimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
More informationAlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationMail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007)
Mail Merge Tutorial (for Word 2003-2007) By Allison King Spring 2007 (updated Fall 2007) What is mail merge? You've probably heard it mentioned around the office or at an interview (especially for a temp
More informationTips for writing good use cases.
Transforming software and systems delivery White paper May 2008 Tips for writing good use cases. James Heumann, Requirements Evangelist, IBM Rational Software Page 2 Contents 2 Introduction 2 Understanding
More informationIntrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
More informationDigital signature in insecure environments
Digital signature in insecure environments Janne Varjus Helsinki University of Technology jvarjus@cc.hut.fi Abstract Due to current legislation the digital signatures can be as valid as the hand written
More informationUsing Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology mimannin@niksula.hut.fi Abstract Artificial Intelligence could make the use of Intrusion Detection
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationMaking the Right Choice
Tools & Automation Making the Right Choice The features you need in a GUI test automation tool by Elisabeth Hendrickson QUICK LOOK Factors to consider in choosing a GUI testing tool Treating GUI test automation
More informationE-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
More informationCustomization & Enhancement Guide. Table of Contents. Index Page. Using This Document
Customization & Enhancement Guide Table of Contents Using This Document This document provides information about using, installing and configuring FTP Attachments applications provided by Enzigma. It also
More informationMODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS
MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:
More informationHowTo. Planning table online
HowTo Project: Description: Planning table online Installation Version: 1.0 Date: 04.09.2008 Short description: With this document you will get information how to install the online planning table on your
More informationUniversity of Hull Department of Computer Science. Wrestling with Python Week 01 Playing with Python
Introduction Welcome to our Python sessions. University of Hull Department of Computer Science Wrestling with Python Week 01 Playing with Python Vsn. 1.0 Rob Miles 2013 Please follow the instructions carefully.
More informationINinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
More informationAgent s Handbook. Your guide to satisfied customers
Agent s Handbook Your guide to satisfied customers Introduction LiveChat is a tool that facilitates communication between a company and its customers. Agents who wield that tool use it to make customers
More informationE-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.
E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination
More informationCHAPTER 26 - SHOPPING CART
CHAPTER 26 - SHOPPING CART ecommerce Hosting With ihoststudio's Shopping Cart Sell your items on the web with the ihoststudio shopping cart. Product catalogs Shopping cart Credit Card Payments Store control
More informationWhite Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
More informationA Quick Start Guide On How To Promote Your Site Using Do It Myself SEO
A Quick Start Guide On How To Promote Your Site Using Do It Myself SEO Introduction Welcome to Do It Myself SEO, a set of tools for SEO, Social Media Analytics and Competitive Analysis. This platform boasts
More informationFinding a Job. When You Have a Record
Finding a Job When You Have a Record Looking for work Y ou want a job. The fact is, to have any kind of future, you need a job. But you re probably asking yourself, Yeah, right, but who s going to hire
More informationA Reseller s Guide to Using Helm
A Reseller s Guide to Using Helm Table of Contents ABOUT HELM AND THIS GUIDE...4 1.) LOGGING INTO HELM...5 2.) CHANGING YOUR PASSWORD...5 3.) CUSTOMIZING YOUR CONTROL PANEL...6 STEP 1: GLOBAL SETTINGS...
More informationThe Integration Between EAI and SOA - Part I
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
More informationThe Social Accelerator Setup Guide
The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you
More informationUtility Communications FOXMAN-UN Network Management System for ABB Communication Equipment
Utility Communications FOXMAN-UN Network Management System for ABB Communication Equipment A reliable & flexible communication network lies at the heart of successful electrical grid operations. A comprehensive
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More informationInstallation Guide for LynxClient
Installation Guide for LynxClient Technical Support: 972-231-6874 Ext. 140 8am to 5pm CST Email: lynx@mitsi.com PC Keyboard Duress Button LynxKey & LynxKeyPro USB Duress Button LynxUSB Notification Popup
More informationAn Oracle White Paper October 2011. BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider
An Oracle White Paper October 2011 BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationGetting Started with Dynamic Web Sites
PHP Tutorial 1 Getting Started with Dynamic Web Sites Setting Up Your Computer To follow this tutorial, you ll need to have PHP, MySQL and a Web server up and running on your computer. This will be your
More informationFioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
More informationThe web server administrator needs to set certain properties to insure that logging is activated.
Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information
More informationAutomatic measurement of Social Media Use
Automatic measurement of Social Media Use Iwan Timmer University of Twente P.O. Box 217, 7500AE Enschede The Netherlands i.r.timmer@student.utwente.nl ABSTRACT Today Social Media is not only used for personal
More informationCloud Services. Sharepoint. Admin Quick Start Guide
Cloud Services Sharepoint Admin Quick Start Guide 3/12/2015 ACTIVATION An activation letter will be sent to the email account of your administrator contact. SharePoint will be part of your Cloud Control
More informationTNT SOFTWARE White Paper Series
TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE
More informationWhite Paper. Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1
White Paper Java versus Ruby Frameworks in Practice STATE OF THE ART SOFTWARE DEVELOPMENT 1 INTRODUCTION...3 FRAMEWORKS AND LANGUAGES...3 SECURITY AND UPGRADES...4 Major Upgrades...4 Minor Upgrades...5
More informationSimple SEO Success. Google Analytics & Google Webmaster Tools
Google Analytics & Google Webmaster Tools In this module we are going to be looking at 2 free tools and why they are essential when running any online business website. First of all you need to ensure
More informationDatabase Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.
Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. 23 Concurrency Control Part -4 In the last lecture, we have
More informationWhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
More informationMicrosoft Query, the helper application included with Microsoft Office, allows
3 RETRIEVING ISERIES DATA WITH MICROSOFT QUERY Microsoft Query, the helper application included with Microsoft Office, allows Office applications such as Word and Excel to read data from ODBC data sources.
More informationDynamics CRM for Outlook Basics
Dynamics CRM for Outlook Basics Microsoft Dynamics CRM April, 2015 Contents Welcome to the CRM for Outlook Basics guide... 1 Meet CRM for Outlook.... 2 A new, but comfortably familiar face................................................................
More informationIMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE
IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT
More informationBasic ESXi Networking
Basic ESXi Networking About vmnics, vswitches, management and virtual machine networks In the vsphere client you can see the network diagram for your ESXi host by clicking Networking on the Configuration
More informationOAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
More informationQaTraq Pro Scripts Manual - Professional Test Scripts Module for QaTraq. QaTraq Pro Scripts. Professional Test Scripts Module for QaTraq
QaTraq Pro Scripts Professional Test Scripts Module for QaTraq QaTraq Professional Modules QaTraq Professional Modules are a range of plug in modules designed to give you even more visibility and control
More informationTroubleshoot Using Event Log Mining
Troubleshoot Using Event Log Mining Jeff Hicks 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo
More informationUsability Test Results
Usability Test Results Task: Starting Position: 1 Home Scene Lauren DiVito March 6, 2014 Moderator Script: Evaluation Measures: Notes to Moderator: Task: Starting Position: Moderator Script: Evaluation
More informationAn in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
More informationTest Driven Development Part III: Continuous Integration Venkat Subramaniam venkats@agiledeveloper.com http://www.agiledeveloper.com/download.
Test Driven Development Part III: Continuous Integration Venkat Subramaniam venkats@agiledeveloper.com http://www.agiledeveloper.com/download.aspx Abstract In this final part of the three part series on
More informationTableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
More informationIn the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
More informationUsing WebLOAD to Monitor Your Production Environment
Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money
More informationkalmstrom.com Business Solutions
HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...
More informationDatabase manager does something that sounds trivial. It makes it easy to setup a new database for searching with Mascot. It also makes it easy to
1 Database manager does something that sounds trivial. It makes it easy to setup a new database for searching with Mascot. It also makes it easy to automate regular updates of these databases. 2 However,
More informationSysAidTM. Monitoring Guide
SysAidTM Monitoring Guide Introduction... 3 Monitoring of Servers... 4 Server Configuration List...4 New Monitoring Configuration for a server...7 General Details Tab...8 Performance...9 Network Services...10
More informationFirewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
More informationTHE WINDOWS AZURE PROGRAMMING MODEL
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
More informationThe ABC s of Communicating with Your Child s School
The ABC s of Communicating with Your Child s School A Ask questions whenever you have a concern. Good schools want involved parents who know what s going on in their schools. They know that sound support
More informationWriter Guide. Chapter 15 Using Forms in Writer
Writer Guide Chapter 15 Using Forms in Writer Copyright This document is Copyright 2005 2008 by its contributors as listed in the section titled Authors. You may distribute it and/or modify it under the
More informationProtecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
More informationNew Generation of Software Development
New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 tyehon@cs.ubc.ca ABSTRACT In this paper, I present a picture of what software development
More informationWHAT IS THE CONFIGURATION TROUBLESHOOTER?
Paper BI-003 Best Practices for SAS Business Intelligence Administrators: Using the Configuration Troubleshooter to Keep SAS Solutions and SAS BI Applications Running Smoothly Tanya Kalich, SAS Institute
More informationCassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
More informationEvaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
More informationData processing goes big
Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,
More informationCross Bulk Mailer 6.1 User Guide
http://dnnmodule.com/ Page 1 of 16 Cross Bulk Mailer 6.1 User Guide (The best email marketing module for DNN 7) http://dnnmodule.com 7/26/2015 Cross Software, China Skype: xiaoqi98@msn.com QQ: 35206992
More informationBuilding Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
More informationReverse proxy for Tomcat Project Plan
Reverse proxy for Tomcat Project Plan Anders Nyman d03any@efd.lth.se June 10, 2005 Version 1.2 This project is now implemented, binary and source code can be found at http://j2ep.sourceforge.net 1 Introduction
More informationOutlook 2010 Essentials
Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...
More informationSecurity Alert Management in E-Business Networks
880 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing Security Alert Management in E-Business Networks Allan Lam, Pradeep K. Ray School of Information Systems, Technology
More informationeasy_review version BoostMyShop
easy_review version BoostMyShop June 16, 2016 Contents easy_review 1 1. Overview 1 Automatic reminder 1 Super easy review write 1 2. Installation 1 1. Upload 1 3. Configuration 2 Version 2 General 3 Product
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationAnalysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
More informationGravity Forms: Creating a Form
Gravity Forms: Creating a Form 1. To create a Gravity Form, you must be logged in as an Administrator. This is accomplished by going to http://your_url/wp- login.php. 2. On the login screen, enter your
More informationSoftware Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539
Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University
More informationSilect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
More informationUsing WhatCounts Publicaster Edition To Send Transactional Emails
Using WhatCounts Publicaster Edition To Send Transactional Emails 1 DEFINITION Transactional email by definition is any message in which the primary purpose facilitates an already agreed-upon transaction
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationMonitoring Windows Event Logs
Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific
More informationPATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
More informationThe Practical Organization of Automated Software Testing
The Practical Organization of Automated Software Testing Author: Herbert M. Isenberg Ph.D. Quality Assurance Architect Oacis Healthcare Systems PO Box 3178 Sausalito, CA. 94966 Type: Experience Report
More information