Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
This information is stored as part of a systems log file.
Analyzing system logs and identifying potential issues with computer systems.
The system logged every call for service into a database for analysis.
System logs are automatically closed after a system-settable period and a new one opened.
In the fiscal year from 1989 to 1990, the court system logged 11 new redevelopment condemnation cases.
Not to worry though, since you can read the system log file, which also has the passwords to all the other accounts.
- A system log of apps I have run!
Lots of info from Safari in the system log.
In 2008, the system logged 764,000 miles.
The information collected is part of a systems log file, and is only used internally for site management purposes.
Security system (complete with system logs that can be provided to employers in order to guarantee work attendance).
The new system logs, classifies, prioritises and allocates incoming calls as appropriate.
"Not only standard logs, but every backup and internal systems log on the ship, even private diaries among the crew.
The system logged an impressive 500,000 vehicle-miles per year and operated with a 99.9% reliability.
The system logs environmental data to an SD card in addition to displaying it on the screen for immediate feedback.
It is important to ensure data security through regular housekeeping such as backing up files, password routines and system logs.
"Write an event to the system log" should definitely be checked, because system logging is inherently a good thing.
Monitoring of the system logs revealed the malfunctions were the result of cyber attacks.
System logging or monitoring tools often receive entries with the relevant devices specified only by IP addresses.
"What happens if someone crooked in the U.S. system logs my fingerprints alongside a photograph of someone else?"
System Logs (user logs and course logs).
"This is the fax most of our passengers stored themselves through, and in the last hundred or so, the system logged an increase in energy consumption.
SDSF is primarily used to access the batch and system log files and dumps.
It can, for instance, look for common files using hash functions and also deconstruct the data structures of the important operating system log files.
The event can be logged as an Event Record or it can be left as an entry in the system log of the device.