- counter log
- In Microsoft Windows 2000, a System Monitor log used to monitor data from local or remote computers about hardware use and system service activity.
Dictionary of networking . 2014.
Dictionary of networking . 2014.
Log management and intelligence — Log Management (LM) comprises an approach to dealing with large volumes of computer generated log messages (also known as audit records, audit trails, event logs, etc). LM covers log collection, centralized aggregation, long term retention and… … Wikipedia
alert log — In Microsoft Windows 2000, a System Monitor log used to monitor counters that exceed user specified limits. When such a limit is exceeded, the event is logged into the alert log. See also counter log; System Monitor; trace log … Dictionary of networking
trace log — In Microsoft Windows 2000, a System Monitor log used to monitor events such as disk input/output or page faults; when the event occurs, it is logged into the trace log. See also alert log; counter log; page fault; System Monitor … Dictionary of networking
SCSI log pages — SCSI target devices provide a number of SCSI log pages. These can be interrogated by a Log Sense command and in some cases can be set by a Log Select command. The Log Sense and Log Select commands include a 6 bit address field, allowing for 64… … Wikipedia
Server log — A server log is a log file (or several files) automatically created and maintained by a server of activity performed by it. A typical example is a web server log which maintains a history of page requests. The W3C maintains a standard format (the … Wikipedia
Common Log Format — The Common Log Format is a standardised text file format used by web servers when generating log files. Because the format is standardised, the files may be analysed by a variety of analysis programs. Each line in a file stored in the Common Log… … Wikipedia
Security log — A security log is used to track security related information on a computer system. Examples include: * Windows Security Log * Internet Connection Firewall security logAccording to Stefan Axelsson, Most UNIX installations do not run any form of… … Wikipedia
System Monitor — In Microsoft Windows 2000, a network and server monitoring tool that displays resource use for selected system level components. Replaces the Windows NT Performance Monitor. See also alert log; counter log; Performance Monitor; trace log … Dictionary of networking
Список с пропусками — (англ. Skip List) вероятностная структура данных, основанная на нескольких параллельных отсортированных связных списках с эффективностью, сравнимой с двоичным деревом (порядка O(log n) среднее время для большинства операций). В основе… … Википедия
Immerman–Szelepcsényi theorem — The Immerman–Szelepcsényi Theorem was proven independently by Neil Immerman and Róbert Szelepcsényi in 1987, for which they shared the 1995 Gödel Prize. In its general form the theorem states that NSPACE = co NSPACE. In other words, if a… … Wikipedia