See how real organizations use corporate learning analytics to report on and share information about learning programs while also proving L&D’s impact.
"Airsage has taken it to the next level in the more recent past with GPS based anonymized data, but data with EXTENSIVE history. The Airsage product is zip code and smaller resolution and can provide months to years of location history of an anonymous cell phone id. " -- https://news.ycombinator.com/item?id=14803443
Log4j will inspect the "log4j.configurationFile" system property and, if set, will attempt to load the configuration using the ConfigurationFactory that matches the file extension.
If no system property is set the properties ConfigurationFactory will look for log4j2-test.properties in the classpath.
If no such file is found the YAML ConfigurationFactory will look for log4j2-test.yaml or log4j2-test.yml in the classpath.
If no such file is found the JSON ConfigurationFactory will look for log4j2-test.json or log4j2-test.jsn in the classpath.
If no such file is found the XML ConfigurationFactory will look for log4j2-test.xml in the classpath.
If a test file cannot be located the properties ConfigurationFactory will look for log4j2.properties on the classpath.
If a properties file cannot be located the YAML ConfigurationFactory will look for log4j2.yaml or log4j2.yml on the classpath.
If a YAML file cannot be located the JSON ConfigurationFactory will look for log4j2.json or log4j2.jsn on the classpath.
If a JSON file cannot be located the XML ConfigurationFactory will try to locate log4j2.xml on the classpath.
If no configuration file could be located the DefaultConfiguration will be used. This will cause logging output to go to the console.
M. Beck, J. Spoerhase, and S. Storandt. Proc. 9th International Conference on Algorithms and Discrete Applied Mathematics (CALDAM'23), 13947, page 321--334. (2023)
A. Mladenow, C. Bauer, C. Strauss, and M. Gregus. 7th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2015), page 1-6. IEEE, (2015)
R. Baker, and I. Martinovic. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, page 35--46. New York, NY, USA, ACM, (2016)
S. Chandra, L. Khan, и F. Muhaya. Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, стр. 838-843. (October 2011)
B. Hecht, L. Hong, B. Suh, и E. Chi. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, стр. 237--246. New York, NY, USA, ACM, (2011)
A. Hang, A. Luca, M. Smith, M. Richter, и H. Hussmann. Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), стр. 169-183. Ottawa, USENIX Association, (July 2015)
P. Patil, S. Sangle, A. Yenare, и R. Sonawane. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (3):
1357--1360(March 2015)
S. Kinsella, V. Murdock, и N. O'Hare. Proceedings of the 3rd International Workshop on Search and Mining User-generated Contents, стр. 61--68. New York, NY, USA, ACM, (2011)