You can download the raw access logs for any domain in your account.
你可以下载使用原木为原料,在任何领域你帐户。
In the example, you used Hadoop to process Apache web server access logs.
在示例中,您使用Hadoop处理Apacheweb服务器访问日志。
For this application, the URLs serve as the keys (as ingested from the Web server access logs).
对于此应用程序来说,URL作为键来服务(从Web服务器访问日志摄取)。
This paper presents a method for session identification based on an analysis of intervals of user access logs.
针对网络日志挖掘中的会话切分问题,提出了一种基于时间间隔的方法。
Luckily, you can do that with the access logs through a couple built-in commands and a handful of log variables.
幸运的是,你可以做到这一点的访问日志,通过一个内置的情侣在命令和变量的日志少数。
The service provider analyzes its access logs and provides its customer with reports about what was requested and when.
服务提供商分析其访问日志,并为客户提供有关用户请求什么内容和在什么时间发出请求的报告。
You can change this configuration parameter during the roll-forward process to allow you to access logs in multiple locations.
在前滚过程中可以更改此配置参数以允许您访问多个位置中的日志。
For example, if you have filed your access logs using dates, you can then select all of the files within a specific range of dates.
例如,如果您已使用日期对访问日志归档,则可以选择在某个特定日期范围内的所有文件。
In this example you want to start with Apache access logs and turn this into a dataset that just contains how many requests you are getting from the various browsers.
在本例中,您想从Apache访问日志开始,将其转换为一个数据集,这个数据集包含您正从各种浏览器收到的那些请求。
Experimental results show that the implementation can cluster the user access logs effectively, and the temporal and special efficiency can meet the on-the-fly need of Web server pre-fetching.
实验结果表明,这种实现能有效地对用户访问日志进行聚类,并能满足服务器预取机制在线分析的时间、空间要求。
Programmatic access to filter, format, and merge local or remote logs and trace.
编程访问,支持过滤、格式化和合并本地或远程日志和跟踪。
Audit logs, for things such as access violations, are sent to the security server by default.
默认情况下,审计日志(比如违规访问)被发送到安全服务器。
Audit logs for events such as access violations can also be managed by the security server.
事件(比如违规访问)审计日志还可以由安全服务器管理。
The exclusive access lock on the queue manager data and logs is released, and the standby queue manager takes over.
队列管理器数据和日志上的独占访问权锁释放,备用队列管理器接管。
This technique yields more concurrent access to storage for persisting transaction information, and faster access to that data from the logs.
此技巧产生的结果是会更多地采用的并发的方式来访问存储以持久化事务信息,以便更快地访问日志中的数据。
It tracks and logs ADO.NET calls so that developers can analyze their data access and discover potential problems.
它会跟踪和记录ado.net调用,以便开发者可对他们的数据访问进行分析,进而发现其中的潜在问题。
Customizable log entries for Access and Error logs and compression statistics.
具有针对访问和错误日志以及压缩统计数据的定制日志条目。
If you have another tool that needs access, or you need to view your logs (to debug a problem, for example), then Aptana once again has you covered.
如果您有一个需要访问的工具,或需要查看日志(例如,调试一个问题),那么Aptana同样为您提供解决办法。
The following section will step a user through the setup required to access the logs through an HTTP connection from a single server IBM Cognos 10 Windows install.
以下部分逐步指导用户通过单一服务器IBMCognos10windows安装上的一个http连接进行访问日志所必需的设置。
Count of URL Access Frequency: The map function processes logs of web page requests and outputs.
URL访问计数:map函数处理web页面的请求日志。
Until recently on Linux, there was no user accessible (non-command line) way to access IM chat logs at all.
从前在Linux平台上,用户根本没有办法(非命令行)访问IM聊天日志。
Most logs are only readable by root, but that can be changed by simply changing the access rights to the file.
大多数日志只有root 才可以读,不过只需要修改文件的访问权限就可以让其他人可读。
Then, you can access the World Clock portlet which produces the Request Metrics logs, as shown in the previous section.
然后,您可以访问产生请求度量日志的World Clock Portlet,如前一部分中所示。
You used Hadoop to turn these logs into business intelligence data that would tell you what web browsers the users of your web site were using to access your site.
使用Hadoop将这些日志转化为商业智能数据,该数据将会告诉您web站点的用户正在使用什么浏览器来访问您的站点。
Using this special manager allows our application to access the existing WebSphere logging system, adding messages to the main console window and trace logs.
使用这个特殊的管理器可以允许我们的应用程序访问已有的WebSphere日志记录系统,把消息添加到主控制台窗口和跟踪日志。
But, you may not always have access to the logs or want to be logged in to your browser to get the information.
但是您可能并不始终具有访问日志的权限,或者并不总是能够登录到浏览器来获取信息。
Because access to these environments is forbidden to developers, you need some approach to allow developers to view and configure logs on different machines so that they can diagnose problems.
由于禁止开发人员访问这些环境,因此需要采用某种方法来允许开发人员在不同的计算机上查看和配置日志,以便能够进行问题诊断。
Once the user logs into the portal, his login is authenticated and then he is given access to all other authorized resources available in the portal.
用户登录进门户之后,对他的身份进行验证,然后他就能够访问门户中所有已授权的资源。
For application servers to perform peer recovery for each other, it is necessary for them to access the recovery logs.
要使服务器之间能执行对等恢复,服务器必须可对恢复日志进行修改。
A subscriber logs in only once for access to any site in the Piano network.
注册用户只要在PIANO的网络上登录一次,就可以访问所有网站。
应用推荐