counter log

counter log
   In Microsoft Windows 2000, a System Monitor log used to monitor data from local or remote computers about hardware use and system service activity.

Dictionary of networking . 2014.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Log management and intelligence — Log Management (LM) comprises an approach to dealing with large volumes of computer generated log messages (also known as audit records, audit trails, event logs, etc). LM covers log collection, centralized aggregation, long term retention and… …   Wikipedia

  • alert log —    In Microsoft Windows 2000, a System Monitor log used to monitor counters that exceed user specified limits. When such a limit is exceeded, the event is logged into the alert log.    See also counter log; System Monitor; trace log …   Dictionary of networking

  • trace log —    In Microsoft Windows 2000, a System Monitor log used to monitor events such as disk input/output or page faults; when the event occurs, it is logged into the trace log.    See also alert log; counter log; page fault; System Monitor …   Dictionary of networking

  • SCSI log pages — SCSI target devices provide a number of SCSI log pages. These can be interrogated by a Log Sense command and in some cases can be set by a Log Select command. The Log Sense and Log Select commands include a 6 bit address field, allowing for 64… …   Wikipedia

  • Server log — A server log is a log file (or several files) automatically created and maintained by a server of activity performed by it. A typical example is a web server log which maintains a history of page requests. The W3C maintains a standard format (the …   Wikipedia

  • Common Log Format — The Common Log Format is a standardised text file format used by web servers when generating log files. Because the format is standardised, the files may be analysed by a variety of analysis programs. Each line in a file stored in the Common Log… …   Wikipedia

  • Security log — A security log is used to track security related information on a computer system. Examples include: * Windows Security Log * Internet Connection Firewall security logAccording to Stefan Axelsson, Most UNIX installations do not run any form of… …   Wikipedia

  • System Monitor —    In Microsoft Windows 2000, a network and server monitoring tool that displays resource use for selected system level components. Replaces the Windows NT Performance Monitor.    See also alert log; counter log; Performance Monitor; trace log …   Dictionary of networking

  • Список с пропусками — (англ. Skip List)  вероятностная структура данных, основанная на нескольких параллельных отсортированных связных списках с эффективностью, сравнимой с двоичным деревом (порядка O(log n) среднее время для большинства операций). В основе… …   Википедия

  • Immerman–Szelepcsényi theorem — The Immerman–Szelepcsényi Theorem was proven independently by Neil Immerman and Róbert Szelepcsényi in 1987, for which they shared the 1995 Gödel Prize. In its general form the theorem states that NSPACE = co NSPACE. In other words, if a… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”