Glossary


User Guide IndexAn Overview of SawmillReportsFiltersUnderstanding the Reports

A

Aggregate: A record of information from different sources, creates a sum of those sources.

Authentication: To identify a user as authentic, with a username and password. HTTPS authentication as a feature of servers is used for sending security-sensitive documents, like payment transactions.

Authenticated users: Verification that the user is who they say they are, or verifying their identity.

Authorized users: Authorization is the verification that a user has the authority or permission to access a system or perform a certain operation.

B

Bandwidth: The measurement of the rate of data transferred, in kilobytes, over a device, network or website.

Binary mode: A method of downloading a file that is encoded in a sequence that the operating system can execute.

Bool or boolean value: The boolean value is a datatype with the values of one or zero, sometimes called true or false. It restricts the range of values allowed for an operation.

C

Comma-separated value (CSV): A data format that has fields separated by commas. Fields which contain CSV, must be enclosed by double quotes.

Concatenation: The joining of two character strings, end to end. An operator will join the two strings together.

Configuration group (.cfg): Grouped text files, called configuration files, where all of the options of Sawmill are stored.

D

DNS: A domain name server stores information associated with domain names, like the IP or email addresses for each domain.

E

e: The mathematical constant e is a unique real number, and is used in exponential functions.

F

Filters: Selectively include or eliminate portions of data. Filters can be applied to log data to affect how the log data is processed or in reports to select what statistics you see.

G

Gigabyte (GB): One billion bytes.

H

Hits: The number of events on a website, events can equate to elements which are images, PDFs or downloadable pages.

HTTP: Hyper Text Transfer Protocol is a request or response protocol between clients or web browsers and servers.

HTTPS: HTTP is to be used, but with an additional layer of encryption or authentication between HTTP and TCP.

I

Iterate: Repeated use of a procedure, applying it each time to the result of the previous application.

IP: Internet Protocol used for computer networking on the Internet.

J

Java: Programming language deriving its syntax from C and C++.

K

K: In Unicode, the capital K is code for U+004B and the lower case k is U+006B.

L

Log fields: Holds log data that can be processed by filters and then copied to database fields.

Log files: Text files that are generated by servers, recording each event or hit that happens.

M

Mapped drives: Refers to computers or drives that are on a network, recognized as part of a closed network or one that has network privileges.

Megabyte (MB): One million bytes.

Metrics: The measuring of web log traffic on a website.

N

Network shares: Distributed users across a network, similar to mapped drives.

Node: A device that is connected and part of a computer network.

O

O: Big O notation describes the limiting behavior of a function for very small or very large arguments.

P

Page views: Refers to the request to load a single page of an Internet site.

Process ID (PID): A unique number used by some operating kernels, such as UNIX or Windows, to identify a process.

Profile: Is a file that contains configuration settings for an individual or group of users.

Q

Query: As in the ask or query the database, used commonly with SQL.

R

Recursive uploads: Refers to the uploading of files using an FTP client that uploads all of the directories, subdirectories and files, in a sequential manner.

Referrers: It is the URL of the previous webpage from which a link was clicked on.

S

Salang: A programming language specific to Sawmill.

Secure Shell (SSH): Is a network protocol designed for logging into and executing commands on a networked computer.

Sessions: A segment of time when a visitor visits a website, for a set amount of time.

Subdomain: A domain that is part of the larger or main domain. It is separated by dots "." and they are read from left to right. An example is mail.domain.com, where mail is the subdomain of domain.

T

Target: As used in the file that you are selecting or focusing a behavior on, as in the "target" file.

U

User agent: Abbreviated, UA, as used in a string to identify the browser being used.

V

Visitors: Refers to the number of people who visited a website and they are identified by their unique IP address.

W

Worms: A self-propagating program, that sends copies of itself through a network. It takes up bandwidth and can harm the network that it attacks.

X,Y,Z



  • User Guide Index