PreviousUsing Investigator Using Enterprise Analysis Tools and SetsNext

Chapter 3: Metering Lines of Code

This chapter describes what metering is and how it affects you.

3.1 Introduction to Metering

You pay for the mass analysis facilities of Revolve Enterprise Edition according to the size of the applications that you analyze. Payment is based on a one-off charge for the enterprise, for each source line within a project, which means that the software has to meter each line of code. At the start of a new project, one person needs to meter the code and then everyone can process the code without further cost, using any Revolve Enterprise Edition facility within that project.

Every time you run an option from the Enterprise menu after opening a project, the software checks that there is a metering record for all of the source lines within the project. If there isn't one, a Metering Wizard appears to allow you to either locate the metering record or meter any unmetered source lines.

The code is metered by means of a usage counter, sometimes referred to as a dongle, that is credited with a number of lines of code. When someone meters code, the usage counter must be attached to the back of that person's PC and then the counter is debited by the appropriate number of lines.

Each line of code needs to be metered only once, and so a record is kept in a metering control file of which code has been metered. When you want to process some code, the metering control file is checked to confirm that the code has been metered.

To meter code you need to be authorized. You need an enabled usage counter and write access to a metering control file.

For more information see the chapter Introduction in your Administration Guide, located in your \help directory.

3.2 Accessing Code that is Already Metered

If the code is already metered, you can use both the analysis tools and worksheet, and start working on that code.

If you select a function for which the code must be metered, such as opening a worksheet, the product attempts to confirm that the code has been metered. If the product cannot confirm that the code is metered, the Metering Wizard starts up and guides you through the metering process. This also happens if you edit the source and want to process it again, since the edited source files need to be loaded into the database, and the new lines need to be metered.

3.3 Metering Lines of Code

We recommend that the number of users authorized to meter code is kept to a minimum. In some organizations, one person takes responsibility for the metering control file, for metering all the code and securing the usage counter.

The Metering Wizard first requires you to point to the metering control file that the administrator has set up for you to use. Then:

  1. If there are outstanding charges, you can see the charges for each new or changed source file, and see the effect those charges have on the current credits on the usage counter.

  2. If you accept the charges, the usage counter is debited with the appropriate number of lines of code, and the metering control file records which code has been metered against which usage counter and when.

  3. You can select some of the programs and meter them against one usage counter, and then attach another usage counter and meter other programs against that counter. All the code has to be metered before you can process it.

After metering the code, we recommend that you remove the usage counter and keep it under lock and key since it is valuable. If you have finished metering for the time being, we recommend that you return the usage counter to the administrator to be temporarily disabled.

Note: If you have problems with a usage counter not being recognized, look up usage counter in the index of the help for suggestions on how to solve this.

3.4 Securing the Metering Control File

The metering control file is valuable. Every time you meter code, it becomes more valuable, because it gives you access to all the metered code. Eventually, it will be more valuable than the usage counter itself. If you lose or damage, or corrupt it, you will not be able to process the metered code. You will need to meter the code again using the usage counter.

To ensure the security of the metering control file, only the metering administrator can create metering control files and set the security protection on them.

Warning: There is a risk that you could meter code that has already been metered in another file. This could happen if you are authorized to meter code and you have both a usage counter and write access to several metering control files.

If you have write access to any metering control files, we strongly recommend that you:

3.5 Safeguarding the Usage Counters

The usage counters are valuable. They have a direct monetary value, since they contain line-of-code credits that you have paid for. Only the administrator can activate usage counters.

If you have a usage counter, we recommend that you:

Copyright © 2000 MERANT International Limited. All rights reserved.
This document and the proprietary marks and names used herein are protected by international law.

PreviousUsing Investigator Using Enterprise Analysis Tools and SetsNext