This article explains how you can capture the problems view and the error log of the application under test, filter them, and customize them to determine problems and identify defects.
本文向您解释了,怎样获得问题视图以及测试程序的错误日志,怎样筛选它们,以及定制它们以决定问题和分析缺陷。
The references to workspace logs in this article can be applied to any application under test that generates a log file.
本文中对工作区的引用可以适用于生成日志文件的任何程序。
If you want to see the complete application code as well as the sample log files the application will be parsing, you can click on the code icon at the top or bottom of this article.
如果希望看到完整的应用程序代码以及这个应用程序将要解析的示例日志文件,可以单击本文顶部或者底部的Code图标。
In this article, the test scenario example in this article requires the user to log into the DayTrader application, buy and sell stock, and then log out of the application.
在本文中,测试场景的例子是本文需要用户登录DayTrader应用程序,购买和出售股票,然后登出该应用程序。
To log in as John (use John as the user name and password), refer to the initial section of this article where you created a repository connection and logged in as the ADMIN user.
以john的名义登陆(使用john作为用户名和密码),参考这篇文章最初部分,您创建存储库和作为ADMIN用户登陆的地方。
Be sure to turn on TRACE logging and watch the log output, which reveals details of the application not discussed in the article.
一定要打开TRACE日志记录,查看日志输出,日志会揭示本文中没有讨论的应用程序细节。
A significant benefit of the extended plug-in described in this article is that it lets you see your notes when you later log in from another client.
本文描述的扩展后的插件有一个非常显著的优势,那就是您可以在随后从另一台客户机登录后查看您的通知。
Up to 20 GB of disk space is required for data and log files to recreate all test cases described in this article.
在重新创建本文所介绍的所有测试用例时,需要20GB的磁盘空间用于存储数据和日志文件。
This article describes how the audit log is set up, and what data is written to the audit log table.
本文描述了如何建立审核日志,以及什么样的数据要写入审核日志表中。
If they log in successfully, they are taken to the desired page (in this case, "Submit an Article").
如果用户成功登录,他们将会被带回“提交文章”页面。
The client developed in this article enables you to log actions for auditing.
本文中所开发的客户机使您可以记录审核操作。
This article describes different IBM NAS log files that contain important authentication audit records, means, and methods to enable them and route them to custom-defined files.
本文描述包含重要身份验证审计记录的IBMNAS日志文件、它们的含义、启用它们的方法以及把它们转发到客户定义的文件的方法。
As I mentioned in a previous log update, someone pointed me to an article noting that herbivores naturally sleep a lot less than omnivores or carnivores.
正如我在前边一篇日记中提到的,草食动物累计的睡眠时间要比肉食动物少很多。
Finally, the article explores the target of kernel-based log data: the log management framework in user space with rsyslog.
最后,本文还介绍了基于内核的日志数据的目标:用户空间中使用rsyslog进行日志管理。
For a taste of Wikipedia's future look, either log in on the site or check out our screenshot below of the 3 millionth article.
如果你想知道Wikipedia未来的模样如何,那么请登录网站或查看下文中第300万篇文章的截图。
This article describes a use case scenario for the log analysis component of DB2 Recovery Expert.
本文描述了DB 2RecoveryExpert的日志分析组件的一个用例场景。
This article shows you how to create a simple Web application that allows users to visit, log in, and then gain access to other areas on the site using Apache Geronimo.
本文向您展示如何使用ApacheGeronimo创建一个简单的Web应用程序,它允许用户访问、登录并且获准访问站点上的其他区域。
In this article, we showed you how to configure DB2 version 9 to be used with WebSphere ESB and, more specifically, how to use it as the message log database for the logging mediation primitive.
在本文中,我们向您介绍了如何配置DB 2Version9,以便与WebSphereESB一起使用,更具体地说,介绍了如何将其用作日志中介基元的消息日志数据库。
At the bottom of this article, you can download a simple J2EE Web application that demonstrates the use of JRas APIs to log trace messages. After you download the file.
您可以在本文的顶部下载范例J2EEWeb应用程序,该程序演示了使用JRasAPI来纪录跟踪消息。
With this article, I will show you how you can log all incoming mails to a file.
根据这一条,我将告诉您如何记录所有的邮件接收到一个文件。
This article provides a mixed strategy topic crawler which is based on network log analysis in order to adapt the dynamics and integrality of topic.
为适应主题的动态性和完整性,本文提出了一种基于网络日志分析的混合策略主题爬虫。
The article provides the system architecture and the principal functions of the log correlation system, then presents a framework of network attacker-tracing system.
在论述日志关联分析平台的体系结构与功能模块的基础上,提出一种新的网络攻击追踪系统模型。
SD-2 log system data transmitted process is analyzed in the article. The extended memory. Interrupt and DMA technology is used in the program according as log practice require.
本文分析了SD-2测井系统数据传输过程,结合测井实际的需要,在软件的编写中,应用了中断、扩展内存、显存直接操作等技术。
The article puts forward a new means in which information of windows system can be got by using log hook function.
而本文提出一种新的简单的方法—利用日志钩子来捕捉系统信息。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
This article mainly deals with the resolution enhancement technique and its application in radioactive logs, such as natural gamma log, compensated neutron log and compensated density log.
着重探讨了放射性测井曲线中自然伽马测井曲线、补偿中子测井曲线和补偿密度测井曲线的高分辨率处理方法及其应用效果。
This article deals with the mathematical model using matrix expression to process the data of log-forms.
本文提出了用矩阵法处理原木形状数据的数学模型,为制材最佳锯剖方案的研究提供了有力的工具。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.
为此,本文对企业安全管理方法和机制进行了研究,提出了一种新型的、分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心。
应用推荐