Retrieving Relevant Reports from a Customer Engagement Repository Dharmesh Thakkar Zhen Ming Jiang Ahmed E. Hassan School of Computing, Queen’s University,

Slides:



Advertisements
Similar presentations
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Advertisements

PC Client Training Customer Name © 2010 CYPRESS COMMUNICATIONS, INC. 1.
Basic Communication on the Internet:
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Manager Product Overview.
Cookies, Sessions. Server Side Includes You can insert the content of one file into another file before the server executes it, with the require() function.
Chapter 5: Introduction to Information Retrieval
1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
PHP syntax basics. Personal Home Page This is a Hypertext processor It works on the server side It demands a Web-server to be installed.
Automated Capacity Planning and Support for Enterprise Applications Dharmesh Thakkar School of Computing, Queen’s University, Canada.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Overview Logging in What you see Address book Sending mail Calendar Blackberry support BUT WHY??? How to get help General Information Questions????
IT skills: IT concepts: Web client (browser), Web server, network connection, URL, mobile client, peer-to- peer application This work is licensed under.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
LOTUS NOTES 8.5. Ease of Filtering/Message Organization: Sort by Who.
What happens when you retrieve a Web page? This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
College Collaboration System User Office Desktop USC Mail Server College Mail Server User Home Desktop Net USC College.
Understanding and Managing WebSphere V5
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
MS Outlook ® OWA (Outlook Web Version) Created by: Patricia Cerio Software Training Specialist Mohawk Regional Information Center
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Module 8: Managing Client Configuration and Connectivity.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Research paper: Web Mining Research: A survey SIGKDD Explorations, June Volume 2, Issue 1 Author: R. Kosala and H. Blockeel.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
State Management. What is State management Why State management ViewState QueryString Cookies.
June 6 th – 8 th 2005 Deployment Tool Set Synergy 2005.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Ideas to Improve SharePoint Usage 4. What are these 4 Ideas? 1. 7 Steps to check SharePoint Health 2. Avoid common Deployment Mistakes 3. Analyze SharePoint.
Xiaoying Gao Computer Science Victoria University of Wellington Intelligent Agents COMP 423.
Chapter Chapter 3 Internet Agents. Chapter Contents Background Web Search Agents Information Filtering Agents Notification Agents Other Service.
Software Performance Testing Based on Workload Characterization Elaine Weyuker Alberto Avritzer Joe Kondek Danielle Liu AT&T Labs.
Computer Emergency Notification System (CENS)
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Outlook 2013 & 2010 Lync Messanger. Outlook 2013 Ribbon Navigation Pane Message View Reading Pane Tabs Status Bar.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
CSC 2720 Building Web Applications Basic Frameworks for Building Dynamic Web Sites / Web Applications.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Transitioning from Groupwise to Exchange. Web Login 1.Open a web browser and type in mail.brcsd.org or follow the link from the website. 2.Select the.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Wednesday NI Vision Sessions
A service Oriented Architecture & Web Service Technology.
3.1 Types of Servers.
Running a Forms Developer Application
Networking Applications
Internet Business Associate v2.0
Netscape Application Server
INTERCEPTION APPLICATION
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Meta Data Deep Dive Part 1
Application of the Internet
Unit 27: Network Operating Systems
Chapter 12: Automated data collection methods
Time Gathering Systems Secure Data Collection for IBM System i Server
Internet Protocols IP: Internet Protocol
Internet Applications & Programming
Exceptions and networking
Presentation transcript:

Retrieving Relevant Reports from a Customer Engagement Repository Dharmesh Thakkar Zhen Ming Jiang Ahmed E. Hassan School of Computing, Queen’s University, Canada Gilbert Hamann Parminder Flora Research In Motion (RIM), Canada

Software Maintenance: Customer Support

Retrieving Relevant Reports ■ State of Practice: –No systematic techniques to retrieve and use information for future engagements –Keyword searching is limited: depends on the search skills and experience of the analyst and peculiarity of the problem

Customer Support Problem Statement ■ We want to find customers with similar operational and problem profiles ■ We can reuse prior solutions and knowledge  Heavy , Light Web, Light MDS  Light , Light Web, Light MDS  Light , Heavy Web, Light MDS  Heavy , Heavy Web, No MDS  Light , Light Web, Heavy MDS Other Customers Compare New Customer Engagement

Using Logs for Customer Support ■ Execution logs are readily available and contain –Operational Profile: usage patterns (heavy users of from device, or to device, or light users of calendar, etc.) –Signature Profile: specific error line patterns (connection timeout, database limits, messages queued up, etc.) ■ Find the most similar profile

Execution Logs ■ Contain time-stamped sequence of events at runtime ■ Readily available representatives of both feature executions and problems Queuing new mail msgid=ABC threadid=XYZ Instant message. Sending packet to client msgid=ABC threadid=XYZ New meeting request msgid=ABC threadid=XYZ Client established IMAP session id=ABC threadid=XYZ Client disconnected. Cannot deliver msgid=ABC threadid=XYZ New contact in address book id=ABC threadid=XYZ User initiated appointment deletion id=ABC threadid=XYZ

Example Other Customers Compare

Our Technique

Log Lines to Event Distribution ■ Remove dynamic information –Example: Given the two log lines “Open inbox user=A” and “Open inbox user=B”, map both lines to the event “Open inbox user=?” ■ Use event percentages to compare event logs for different running lengths without bias

Compare Event Distributions ■ Kullback-Leibler Divergence ■ Cosine Distance

Identify Signature Events ■ Signature Events have a different frequency when compared to events in other log files –Example signature events: dropped connections, thread dumps, and full queues ■ Chi-square test identifies such events

Measuring Performance ■ Precision = 2/4 = 50% 100% precise if all the retrieved log files are relevant ■ Recall = 2/3 = 67% 100% recall if all the relevant log files are retrieved

The Big Picture

Case Studies ■ Case Study I –Dell DVD Store open source application –Code instrumentation done for event logging –Built the execution log repository by applying synthetic workloads, changing the workload parameters each time ■ Case Study II –Globally deployed commercial application –More than 500 unique execution events

Case Study Results ■ Dell DVD Store –100% precision and recall on both operational profile based and signature profile based retrieval ■ Commercial Application –100% precision and recall for signature profile based retrieval –Results for operational profile based retrieval: Experiment Count of Log Files K-L DistanceCosine Distance PrecisionRecallPrecisionRecall Single Feature Group %90.28%67.71%90.28% Multiple Feature Groups %80.95%75.00%100.00% All Feature Groups %97.22%62.50%83.33% Real World Log Files %72.22%68.75%91.67% All the Log Files %79.90%56.72%75.62%

Sources of Errors ■ Events that do not correspond directly to a particular operational feature, such as idle time events, server health check events, startup and shutdown events ■ Imbalance in the event logging

Imbalance in Event Logging

Related Work ■ Data mining techniques on textual information [Hui and Jha, 2000] –Cons: Limited results, depending on analyst’s search skills and peculiarity of the problem ■ Using customer usage data [Elbaum and Narla, 2004] –Cons: Customer usage data rarely exists ■ Clustering HTTP execution logs [Menascé, 1999] –Cons: Complex process, works only for HTTP logs ■ Software Agent Deployment to build operational profile [Ramanujam et. al., 2006] –Cons: Intrusive, complex, costly

Conclusion