Author Archives: Peter Nieuwesteeg
The other day I got a model from a user and every time that I solved the model the results were different. At first I thought that some of the outputs were used as input, but that wasn’t the case. After some analysis I found out that this statement was the culprit:
ShippingDuration(o,d) := uniform(22,34);
The user was prototyping and did not have all the data yet. In reality, you will use the known (average) durations.
If you ever asked a question via email@example.com, you’ve probably seen a message with the title “One quick question about AIMMS Customer Support” after your issue was closed. In this message, you’re asked to rate your recent customer service experience by clicking on one of four different options. I would like to explain how we use this information in this blog post.
The number of positive (green and gold) responses (among the last 100 responses) is a Key Performance Indicator for our customer support team. This number is visible on the big KPI boards in both our European and US office. So, don’t hesitate to take a look at the board the next time that you’re in one of our offices. This information is updated in real-time, which means that this number will change directly once you send in a response. This number is not only visible inside our office, but it is also available to everyone with internet access. This picture is updated in real-time with the latest status as well:
Encryption is typically used to protect the intellectual property (IP) in your AIMMS model and libraries. Access to your application can also be restricted in both AIMMS 3 and AIMMS 4; though the methods differ between the two AIMMS versions.
In AIMMS 3, you had the option to encrypt your project in such a way that it was always stored encrypted, even during development. The benefit is that you could send everything you had to an end-user and you didn’t have to worry about them getting access to the source. Alternatively, you could send them just one or two encrypted libraries. Of course, the disadvantage in AIMMS 3 is that you had no option to do code comparison and/or version control.
As of AIMMS 4, all project sources are text-based. This allows you to use version control software. As a result, the model is no longer stored encrypted and explicit steps are needed to create encrypted code.
This blog posts illustrates how you can create an encrypted project out of the source. The steps required to create an encrypted library will be discussed here as well.
The goal of this article is to explain how you can control errors and warnings within AIMMS. Namely, we will walk you through some useful tips that can help you manage errors and warnings in the best possible way to create better models.
AIMMS models can be very complicated, with lots and lots of identifiers, procedures, pages and menus. You probably know that AIMMS has a search functionality in the model explorer, allowing you to find references to a particular identifier in the complete model. But did you also know that AIMMS offers you the possibility to find out in which page an identifier is being used? You can even find the object in which the identifier is located using AIMMS.