Home
 > search for

Featured Documents related to »  log file analysis


Counting Website Traffic
Knowing how many people visit your website can help you improve the site and increase revenues. Counting them can be easy or accurate, but not both.

log file analysis  Identifying visits from a log file takes a tad more cleverness than counting page impressions. A log analyzer starts with the IP address for the browser, but this is frequently not sufficient to distinguish between different surfers, especially when they are coming from AOL. So the analyzer may also look at the referring field to establish a trail within the site, the cookie and username fields, and of course the time. Different analyzers have different algorithms and so will produce slightly different Read More...
Recruitment and Staffing
Recruitment and Staffing functionality allows the user to select and hire the right people with the right skill sets, as well as track the information regarding their recruitment for later analysis...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » log file analysis


A Definition of Data Warehousing
There is a great deal of confusion over the meaning of data warehousing. Simply defined, a data warehouse is a place for data, whereas data warehousing

log file analysis  Stored Procedures, and Database Log Analysis. Data Cleansing: This is typically performed in conjunction with data acquisition (it can be part of the T in ETL ). A data warehouse that contains incorrect data is not only useless, but also very dangerous. The whole idea behind a data warehouse is to enable decision-making. If a high level decision is made based on incorrect data in the warehouse, the company could suffer severe consequences, or even complete failure. Data cleansing is a complicated Read More...
Taking Multilingual Support to the Next Level
Product managers in product companies are trying to develop applications that support multilingual functionality. Multinational corporations use multilingual

log file analysis  at the time of logging in, but let them toggle between multiple languages on the fly. Apart from the multilingual screens, menus, and help features, the application will have to cater to data entry, querying, and reporting needs in the different supported languages. This means support for various accents such as the German umlaut , French grave , acute , cedilla , circumflex, and the Spanish tilde . In addition, sensitivity to different date formats such as 15 June 2006 in the UK versus 15. Juni 2006 Read More...
INFIMACS Becoming Ever More RELEVANT For Project-Based Industries. Part 1: Recent Developments
If Relevant Business Systems has for any reason deliberately maintained its INFIMACS II ERP system as one of the best-kept secrets in the complex manufacturing

log file analysis  messages in the error log, as the transfer process enforces strict quality control checks and balances. Automatic generation of vendor request for quotations (RFQs) from requisitions/estimates for direct material, indirect material and service items - RFQs are then processed through a cycle that includes vendor selection, price approval and purchase order creation. Increased customer dialogue by administering service calls - Users can add, maintain and track the status and severity of service requests Read More...
PeopleSoft on Client/Server and Database Issues
To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture

log file analysis  ability for users to log on once to a network and be able to access all authorized resources within the enterprise. A single sign-on program accepts the user's name and password and automatically logs on to all appropriate servers. It is an important feature that the client should investigate with any ERP vendor being considered. The exact method of making the call to the SSO product should be discussed in depth. Question: What is the maximum number of concurrent production users that has been recorded Read More...
How to Boost File Transfer Speeds 100x Without Increasing Bandwidth
This white paper discusses why pure TCP-based file transfer protocols are unable to fully utilize network throughput due to high latency or packet loss, and how

log file analysis  to Boost File Transfer Speeds 100x Without Increasing Bandwidth This white paper discusses why pure TCP-based file transfer protocols are unable to fully utilize network throughput due to high latency or packet loss, and how to accelerate file transfers up to 100x utilizing a combination of UDP and TCP. Read More...
Infor SyteLine: ERP for SMB Competitor Analysis Report
The accounting and ERP for small and medium businesses (SMB) evaluation model targets functional requirements for a fully featured accounting solution. In

log file analysis  Accounting, Manufacturing, Inventory, Technology, and much more. Read More...
Network Security Best Practices: Competitive Analysis
When it comes to security architecture, choosing a system that’s scalable and applicable to a broad set of security needs is a wise move. New security services

log file analysis  state of key distribution technologies and in particular: Recent RFCs from the IETF MSec Working Group (RFCs); in particular RFC 3547, Group Domain of Interpretation (GDOI) and RFC 4335, Group Secure Association Group Management (GSAKMP) ; Cisco’s Dynamic Multipoint Virtual Private Network (DMVPN) , with the additional requirement of Multipoint GRE (mGRE) and Next Hop Resolution Protocol (NHRP) as detailed in RFC 2332. From a comparative perspective, a description of CipherOptics’ CipherEngine is Read More...
Benchmark Study - Embarcadero Technologies, Inc. CM/Data Competitive Analysis
Competitive testing analysis is a vital part of designing, evaluating, and marketing hardware and software products. National Technical Systems (NTS) tested two

log file analysis  Study - Embarcadero Technologies, Inc. CM/Data Competitive Analysis Competitive testing analysis is a vital part of designing, evaluating, and marketing hardware and software products. National Technical Systems (NTS) tested two change management systems, measuring how quickly each compares selected datasets. Find out which solution proved to be twice as fast as the other in a local area network (LAN), and almost 24 times faster in a wide area network (WAN) environment. Learn more. Read More...
Intellicus Enterprise Reporting and Business Insights Platform: Business Intelligence (BI) Competitor Analysis Report
This business intelligence (BI) knowledge base covers a full range of BI functionality. BI applications enable real time, interactive access, analysis, and

log file analysis   Read More...
The eG Approach to Root-cause Analysis
Effective correlation and accurate root-cause diagnosis have been key challenges for network and systems management solutions for many years. Indeed, these

log file analysis   Read More...
Oco On Demand Business Intelligence: Business Intelligence (BI) Competitor Analysis Report
This business intelligence (BI) knowledge base covers a full range of BI functionality. BI applications enable real time, interactive access, analysis, and

log file analysis   Read More...
TARGIT Decision Suite : Business Intelligence (BI) Competitor Analysis Report
This business intelligence (BI) knowledge base covers a full range of BI functionality. BI applications enable real time, interactive access, analysis, and

log file analysis   Read More...
Dynamics NAV: ERP for SMB Competitor Analysis Report
The accounting and ERP for small and medium businesses (SMB) evaluation model targets functional requirements for a fully featured accounting solution. In

log file analysis  Accounting, Manufacturing, Inventory, Technology, and much more. Read More...
Microsoft .NET Enablement: Analysis and Cautions
Using technologies that are intrinsically compatible should result in faster and less costly development. Thus, any application suite rewritten in the Microsoft

log file analysis  much of the business logic in a far more componentized and granular way, in order to support Web service calls. For instance, the checking capability to promise (CTP) call that Vantage users require cannot operate properly without the .NET Framework. Certainly, the presence of Progress means that Vantage is not completely in .NET-managed code. However, with Vantage Epicor has not planned to be 100 percent .NET, but rather 100 percent SOA. The vendor has simply used .NET for the majority of the solution Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others