
SR P
RODUCTIVITY
R
EPORTS
S
ECTION
C
HAPTER
4: S
PECIALIZED
R
EPORTS
756
M86 S
ECURITY
U
SER
G
UIDE
Time Usage algorithm
For each end user included in the report, the number of
seconds from the log is dropped, and each unique minute
within a given hour counts as one minute.
In the following example, the end user shows a total of
seven minutes of Time Usage:
12:00:01
www.m86security.com
12:00:10
www.abc.com
12:01:00
www.m86security.com
12:02:04
www.whitepages.com
12:05:58
www.yellowpages.com
12:05:58
www.yellowpages.com/714.jsp
12:05:59
www.yellowpages.com/phone_number.gif
12:07:03
www.google.com
12:07:33
www.yahoo.com
12:08:23
www.news.com
12:08:30
www.usatoday.com
12:08:59
www.usatoday.com/usa.gif
12:09:00
www.usatoday.com/ca.gif
12:09:01
www.yahoo.com
12:09:02
http://200.100.10.65:88
12:09:03
www.abc.com
12:09:04
www.nbc.com
The total for this end user is based on a nine-minute time
span that includes 17 entries in the log, and seven unique
minute entries: 00, 01, 02, 05, 07, 08, and 09.