× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Al,
A good summary of why user-based pricing doesn't work, although it would be
nice if it did, because machine based pricing just causes under-sized boxes
and performance problems.
Clare

----- Original Message -----
From: <MacWheel99@aol.com>
To: <MIDRANGE-L@midrange.com>
Sent: Tuesday, July 31, 2001 5:55 PM
Subject: Re: Counting users


> Take your pick ... my full name is Alister Wm Macintyre
> to save hassles with phone callers (how do you spell pronounce ... is that
a
> boy's name or a girls name ... I often go by Al Macintyre
> around the office work place my moniker is Al Mac
>
> Do you have a naming policy for your auto configuration?
> We let auto config do its thing with DSP99 or PRT07 then we change the
name
> to one based on location
> PRTSHIP means printer in the Shipping Dept
> anything without a "P" in front is a work station
> BUY9 means it is in the Purchasing Dept
>
> In the Textual description area we identify the building location
> )e.g. NW corner of EVA factory)
> or the person desk it is on or office it is in
> (e.g. RECEIVING of LAW factory)
> and how many sessions that work station is capable of supporting
>
> This serves a multitude of functions.
> When we got error messages we not need to be saying
> "Where the heck is DSP27?" because many people know our naming conventions
&
> recognize what stuff is in accounting area, engineering areia, sales area,
> etc, & a few know how to look it up in the configuration.
>
> Many people meet variations on this question when it comes to software
> licenses & what's honest & fair when the methodology of license
enforcement
> is heavily based on our integrity, and it also comes up in sizing for
> performance.
>
> In a small office you can answer the question with a walk around.
> WHO is at that device, and how many are unattended with someone allegedly
> signed on & DSPLOG will tell you WHEN they signed on, and when you find
the
> USER of that user-id we can ASK them.
>
> You may know someone at a remote office who you can trust to do the walk
> around to diplomatically locate the 5 sessions that currently signed on
with
> same user-id & get you a spot check inventory ... while actually have
someone
> standing or seated at that address, and if no one home, ask nearest work
> station user if they remember who was last person to use that device.
>
> I do not believe DSPLOG can go to an *OUTFILE to chart on/off by user id
to
> locate overlaps, but if you have your suspicions about some pattern, you
can
> do DSPLOG F4 & search for specific types of actifity & in fact I have a CL
> that regularly does a variation on that.
>
> We do have some supervisory personnel who need to go to different places
in
> the company to consult with people on wide ranges of topics & while there,
> use whatever device is convenient to look up stuff, and invariably leave
it
> signed on, and hature of person job is they need high security, and I sure
> don't want to be the one to undermine their productivity.
>
> I am aware of the practice.  I know the persons who doing it.
> I have no authority to stop it.
> When people ask me how come this or that data got corrupted,
> I include this security risk as one of the possibilities.
>
> In a larger enterprise where you not know everyone, and there are remote
> offices, you may need a tool like http://www.precosis.com.au/rv1.htm to
spy
> on WHAT are those users DOING
>
> We have twinax work stations scattered across our factory floor.
> We have a very limited inquiry only sign on with a public password - by
using
> it the people can only get to certain menus, certain inquiry options into
our
> inventory & production & engineering information.
> On a typical day, this same identical public sign on is being used at half
a
> dozen different work stations in each of two factories for random look up
of
> stuff by people to whom we have not issued individual user profiles.
>
> This is a corporate policy that was suggested, discussed, approved.
> It is well known throughout the company.
>
> I could see that in some enterprises something like this might be going on
> without everyone concerned being aware of it, knowing why it is being
done,
> or even approving of it.
>
> Sometimes when a new person is hired & taught how to do their job, somehow
> MIS is not informed that we need to issue a new user profile, and they are
> using the sign-on & password of a co-worker.
>
> We have people who are the only people with security access to some
important
> stuff.  They go on vacation.  Their work gets done while they are away.  I
> have my suspicions how this is accomplished.
>
> I personnally have 5 user-ids.  I use different ones for production vs.
test
> environments, regular programming work v.s  high security stuff.  I am not
> the only person in this reality.  A count of user-ids is not a count of
real
> person users.
>
> We also have some dummy user profiles created to be depositories of shared
> messages, that started out as a different purpose
>
> DSPMSG SALES to see messages that the sales dept needs to be aware of
> Originally user SALES was intended for random inquiry by people who were
not
> going to be heavy BPCS users.
>
> The idea was ... issue user profiles to people doing heavy duty work & who
> needed different mix of security access, while each department have a
limited
> security public sign on for the folks who needed occasional access to some
> inquiries ... this simplified training & we could have index card on work
> stations with sign-on & password which was setup so there was no way to
spoof
> past that into stuff they not allowed to access, but then they started
> putting that on PCs & I had to pull that plug because of how BPCS 405
> "security" structured.
>
> I think that perhaps software could be developed & may even exist to track
> the kind of information that performance tools get ... which of these
> interactive sessions are active at any one moment.  With a person signed
onto
> multiple sessions of one terminal, theoretically they only active on one
side
> AT A TIME.  With SAME person signed onto multiple terminals, theoretically
> they only active at one AT A TIME but some other user might come along &
> start using the signed on terminal, without first signing off the earlier
> user & signing on themselves.
>
> > From: Ron@cpumms.com
> >
> >  MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
> >  Not sure what name to use here....
> >
> >  This is exactly what we're trying to discover....
> >
> >
> >  << I suspect the reality is not really
> >  1 person signed on at 5 terminals vs.
> >  1 person signed onto 5 sides, but that the
> >  1 person signed on at 5 terminals is really
> >  5 people using the same sign-on,
> >  while the 1 person with 5 sides is
> >  really one person at a time at that terminal. >>
> >
> >
> >  Ron Hawkins
>
>
> MacWheel99@aol.com (Alister Wm Macintyre) (Al Mac)
> +---
> | This is the Midrange System Mailing List!
> | To submit a new message, send your mail to MIDRANGE-L@midrange.com.
> | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
> | To unsubscribe from this list send email to
MIDRANGE-L-UNSUB@midrange.com.
> | Questions should be directed to the list owner/operator:
david@midrange.com
> +---

+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.