General Limitations General Considerations
8.2.7 General Limitations
Content Tracker is supported on most hardware and networked configurations. There are, however, certain hardware and software combinations that require special consideration. Some known limitations include: ■ In some circumstances, exact access counts cannot be guaranteed for content that is requested through static URLs or by WebDAV. See Tracking Limitations with Static URLs and WebDAV on page 8-19. ■ To successfully record access activity, the user’s account must have write access to Content Tracker’s data directory. Otherwise, some access requests will not be recorded in the event logs. See Tracking Limitations and Data Directory Protections on page 8-21. ■ When the ExtranetLook component is enabled, there are some situations where user access requests are not recorded in Content Tracker’s raw event logs. See Tracking Limitations with ExtranetLook Component on page 8-21. Managing Content Tracker 8-7 ■ When either Oracle or DB2 is used as the Content Server database, metadata values are case sensitive. See Oracle and DB2 Case Sensitivity on page 8-57. ■ When Access Control Lists ACLs are enabled on a Content Server instance, the Content Tracker Reports secure mode does not work. See Access Control Lists and Content Tracker Reports Secure Mode on page 8-57. ■ When Oracle is used as the Content Server database, some additional, customized file configurations are necessary if you want to use aliases to display column names. See Custom Report Queries and Oracle on page 8-60.8.2.8 General Considerations
The following general considerations are applicable for the current version of the Content Tracker and Content Tracker Reports components: ■ Hanging browser: If Content Server happens to terminate while the Data Engine Control Center is running, the browser can also hang. To easily resolve this issue, close the hung browser window. ■ Local time vs. GMT: A configuration parameter enables you to use local time instead of Greenwich Mean Time GMT to record user access times: – SctUseGMT=true configures Content Tracker to use GMT. – SctUseGMT=false configures Content Tracker to use local time. This is the default setting. If you are performing a new installation of Content Tracker and use the default setting for SctUseGMT, user accesses will be recorded in local time. If you are upgrading from an earlier version of Content Tracker and use the default setting for SctUseGMT, there will be a one-time retreat or advance, depending on your location in access times. Also, to accommodate the biannual daylight savings time changes, there will be discontinuities in recorded user access times contingent on whether you use local time and your location.8.3 Operational Overview
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more