GB2357680A - Monitoring of services provided over a network with determination of interactive content of web pages - Google Patents
Monitoring of services provided over a network with determination of interactive content of web pages Download PDFInfo
- Publication number
- GB2357680A GB2357680A GB0109291A GB0109291A GB2357680A GB 2357680 A GB2357680 A GB 2357680A GB 0109291 A GB0109291 A GB 0109291A GB 0109291 A GB0109291 A GB 0109291A GB 2357680 A GB2357680 A GB 2357680A
- Authority
- GB
- United Kingdom
- Prior art keywords
- page
- applet
- data
- communications unit
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/508—Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
- H04L41/509—Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to media content delivery, e.g. audio, video or TV
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/954—Navigation, e.g. using categorised browsing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5009—Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
- H04L43/106—Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
- Debugging And Monitoring (AREA)
Abstract
A monitoring applet (102) is loaded into a users network terminal either as a plug in for a network browser or as part of a downloaded web page (101). This applet may scan web pages downloaded into the browser to determine their active content (buttons, hyperlinks etc.) and the actions which these active areas may initiate. The applet may inform the monitoring server (41) that it is active and receive configuration instructions in response. Once configured the monitoring applet records user interactions with a downloaded web page (cursor position, buttons pressed, text entered into fields etc.) and transmits this information to the monitoring server. The monitoring server may use this data to produce various analyses and reports. The data may also be played back to allow redisplay and analysis of a users interactions or to provide a test signal to be applied to an application server (3). The network will typically be the internet or World Wide Web and the applet will typically be in a Java (RTM) or Javascript (RTM).
Description
2357680 Monitoring Operation of Services provided over a Network This
invention relates to monitoring the operation of services provided over a network. In particular it relates to monitoring the operation of services provided over an intranet and/or the Internet and particularly the World Wide Web.
There is currently great interest and activity in providing services via networks and particularly the World Wide Web. However, some difficulties arise for providers and users in providing and using such services. In particular, waiting for web pages to download from the World Wide Web can be time consuming and this factor together with a poorly designed website can severely limit the efficiency of web based services. Whilst these difficulties with web based services are widely appreciated, there have, to date, been no satisfactory systems available for gaining data concerning the effectiveness and usability of any given web based service. Existing systems tend to provide generalised information by monitoring networks and servers.
It has been appreciated that obtaining detailed information concerning the use made of websites by individual users can be invaluable in enhancing the 2 services which are provided over the Internet and particularly the World Wide Web.
It is an object of this invention to provide a system for monitoring the operation of services provided over a network. At least some embodiments are directed to obtaining information concerning how the performance of the service is perceived by users.
According to a first aspect of the present invention there is provided a method of operating an end user communications unit for use in a system f or monitoring operation of services provided over a network, the communications unit being arranged to allow reception of services provided over the network and the method comprising the steps of monitoring activity, at the communications unit, associated with a service provided over the network and outputting information so obtained and wherein the service is accessed via at least one web, or other electronic, page and the method comprises the further step of identifying the interactive content of a page as the page is visited and loaded into the communications unit.
According to a second aspect of the present invention there is provided an end user communications unit for use in a system for monitoring operation of h 3 services provided over a network, the communications unit being arranged to allow reception of services provided over the network, being arranged to monitor activity associated with a service provided over the network and being arranged to output information so obtained, wherein the service is accessed via at least one web, or other electronic, page and the communications unit is arranged for identifying the interactive content of a page as the page is visited and loaded into the communications unit.
Such arrangements make use of the aggregate computing power available at the many user communications units which are typically connected to a network rather than attempting to support such data gathering with a single or a few central servers. It is also possible to collect data which is specific to the experience of each of a number of users.
It will be appreciated that playing back of recorded activities refers to the apparatus itself, under the control of suitable software, running through any and all steps instigated by a user when the recording was carried out.
In this application "activity"/ "activity instigated by the user" includes actions directly carried out by the user such as "clicking" of a mouse 4 on an icon and actions carried out by the system without the user being directly involved, for example, data being sent and/or received. In practice activity will typically comprise a stream of occurrences consisting of actions taken by the user and events taking place within communications unit.
The methods may comprise the further step of analysing the data obtained during the monitoring step. The apparatus may be arranged for analysing monitored data. The analysis may comprise filtering the data so that it can be presented in a more convenient form. one or more filter rules may be specified for use in the filter process. The or each filter rule may define a standard event which comprises a predetermined set of occurrences. One or more filter rule may specify at least one parameter, values for which are to be extracted from the predetermined set of occurrences. The filtered data may be presented in terms of standard events and associated values. Preferably the analysis is carried out at the central unit.
The term end user communications unit is used broadly in this application and should be taken to include conventional computers including PCs, interactive television based systems, landline and A mobile communications (telephone) based systems and any other such system which is able to receive information provided across a network. The system may be used with units operating in accordance with WAP (Wireless Application Protocol).
The central unit to which monitoring information is sent is generally distinct from any server supporting services which are to be monitored. The central unit may belong to an organisation which is interested in gathering its own performance information or to an organisation administering the performance monitoring system on behalf of customers. Information collated at the central unit may be accessible via a web site. Customers may be allowed access to information at the central unit which relates to the services which they supply. The central unit may comprise a plurality of devices, for example servers, operating in parallel. In some embodiments more than one central unit may be provided.
The network over which services are provided typically comprises an intranet and/or the Internet.
The services provided are typically accessible via the World Wide Web. Thus the services are typically accessible via a web site. A user's communications unit may run a browser. The browser may be a generally 1 6 available browser such as MS Internet Explorer or Netscape Navigator. Alternatively a dedicated browser may be provided. The browser may be an embedded application in, for example, a WAP communications 5 unit.
Any one or any combination of the monitoring, outputting, recording and play back functionality at the communications unit may be facilitated by an applet. Preferably the applet runs in a language which is cross-platform. This facilitates the system functioning on a large range of dif f erent end user communications units. The applet may be confined in an environment such that the applet's access to the end user's communications unit is restricted. This can Is significantly enhance security.
In this application the term applet is used broadly to mean an application which runs within a browser. The applet may be in any appropriate (gr) (#TA) language, for example Java and/or JavaScript. However, use of the term applet should not be taken to specifically imply that the applet is written in/runs in Java. The applet may be persistent or non- persistent. Thus, the applet may be resident in the browser at all times so that activity relating to all pages is monitored or the applet may be associated 7 only with certain web pages so that only activity in relation to such pages is monitored. In the persistent case the applet is installed, at the communications unit, by a user or system administrator. In the non-persistent case the applet is loaded and deleted, at the communications unit, as a page is visited and left respectively.
As defined above, the communications unit is arranged so that as a page is visited and loaded into the unit, the interactive content of the page is identified. For example, a page may include a button which can be "pressed" by a user and field allowing the input of text. In the identifying step, the unit may identify that the button and text field are present. If the button is pressed or text is entered this action may be monitored and recorded or reported.
The identifying step may include determining information concerning the relevance and/or context of the interactive content. For example, the relevance, context, effect etc of a user entering text or pressing the button may be identified. This information can be associated with any recorded or reported action.
In at least some embodiments any one or any 8 combination of the following may be monitored: start of page load, completion of page load, completion of image or frame load, user input of data starts, user input of data finishes, user data, hot spot and hyperlink roll-overs, hyperlink selection, mouse position, field selections, browser toolbar usage, next Uniform Resource Locator (URL) selected, user editing field information, user identification (log on name, device, Internet Protocol (IP) address etc.).
The data output and/or sent to a central unit as a result of the monitoring process may be encrypted. Since it is operation characteristics which are of interest, certain sensitive data, such as credit card details, may be irrelevant. Thus any such sensitive data may be replaced by arbitrary symbols in the information output andlor sent to a central unit. Timing means may be provided for giving time stamp references to activities. Preferably a universal time reference source is provided at the central unit. 20 In at least some embodiments any one or any combination of the following real time displays or reports may be generated for a site being monitored: number of visitors per unit time, number of new customers, number of customers who ordered, number of customers by location, number of visitors who tried 9 and f ailed to order, total web site orders, value of total web site orders, usability of web site, apparent speed per customer, typical routes through site, page hot spots or trouble spots, time to complete transaction pair, events by time of day, average /minimum/maximum time to complete transaction, page load time by time of day, time f rom page load to page exit, exit route f rom each page, name of user by time of day, IP address of user by time of day.
The or each communications unit may, amongst other things, function as a data capture module. The central unit may, amongst other things, function as a database server. According to a third aspect of the present invention there is provided a machine readable medium having thereon code portions which when loaded and run on computer means cause the computer means to execute any method defined above and/or provides any appratatus, defined above.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:Figure 1 schematically shows the architecture of a system for monitoring the performance of services provided over a network; Figure 2 schematically shows a system for monitoring the performance of a website based service provided over the World Wide Web wherein the monitoring activity takes place within a browser; Figure 3 schematically shows the steps carried out in monitoring activity associated with a web page in the system shown in Figure 2; Figure 4 schematically shows a process used to test a server system; Figure 5 schematically shows internal architecture of a database server; and Figure 6 shows an example of data stored in a data log of the database server shown in Figure 5.
Figure 1 schematically shows the architecture of a system for monitoring the performance of services provided over a network.
A plurality of end user communication units 1 which can include conventional computers, interactive television based systems and wireless communication systems etc., are connected to an intranet or the Internet network 2 and thus are able to access services supported by a large number of different 11 servers 3 (only one of which is shown in Figure 1). A central unit 4 to which data concerning the performance of services provided over the network is to be sent, as will be explained in more detail below, is also connected to the intranet or Internet 2. A customer's computer system 5 is connected via the intranet or Internet 2 to the central unit 4 to allow the customer to extract information concerning the performance of services in which he is interested.
Although not shown in detail it will be appreciated by those skilled in the art that within the intranet or Internet 2 there will be a number of intermediate devices such as routers, servers and other devices. These are all potentially connectable to the central unit 4 and as such data concerning performance of these intermediate devices may also be monitored and sent to the central unit 4. A simplified description of the functioning of the system is given below.
At each of the end user units 1 a user will access a service supported by a web server 3 via the intranet or Internet 2. As this service is used by the user then, under the control of appropriate software, each end user unit 1 monitors activities instigated by the user which relate to the service being used. The data obtained during this monitoring 12 step is then sent f rom each of the end user communication units 1 via the intranet or Internet 2 to the central unit 4. The central unit 4 functions as a database server and performs a number of functions as will be described in more detail below. At this point it is enough to note that all of the data obtained at each of the end user communication units 1 is stored at the central unit 4 and is put into a useful form such that a customer may obtain data concerning the services in which he is interested either in the f orm of hard copy reports or via his computer system 5 and the intranet or Internet 2. In particular it is envisaged that the customer will operate a web site based service and will desire information concerning the performance of that website.
Each of the end user communication units 1 includes a processor, a memory, and other elements which are arranged under the control of appropriate software to capture data concerning various activities which take place in respect of the service being provided over the network 2. Different pieces of software are provided to give this data capture function in different circumstances. Different pieces of such software will be described in more detail below.
11.1 13 As mentioned above data capture modules can be arranged to collect information from a variety of sources. In particular data can be collected by monitoring activities within a user's browser, from the network deliveri ng data to the user, and f rom servers hosting the web pages or applications which a user is using and/or running. However, it will be appreciated by those skilled in the art that the collection of data need not necessarily be limited to the above-mentioned sources.
The central unit 4 includes a processor, a memory and other elements which are arranged under the control of appropriate software to act as a database server which is used for receiving, storing, analysing and organising data captured by any of the data capture modules as well as generating reports concerning such data.
Appropriate software is also provided to customers for use with their computer systems 5 in order to further process and interpret the data stored at the central unit 4. In particular it is possible for customers to generate reports, analyse statistics and generate graphs on the basis of the collected data.
It should be noted that the methods and apparatus 14 for monitoring and/or testing the performance of services provided over a network which this application concerns may be used in relation to any appropriate service provided over a network. The methods and apparatus are not limited to use with services provided via websites accessible over the World Wide Web. However, for the sake of clarity the remaining detailed description will be phrased in terms exclusively relating to services that are accessible via a website and the World Wide Web.
Figure 2 schematically shows a system for monitoring the performance of a website based service provided over the World Wide Web wherein the monitoring activity takes place within a browser such as Netscape Navigator or MS Interned Explorer loaded on a user' s computer system which acts as a communications unit 1.
In the case shown in Figure 2 the data capture module consists of a user's computer system 1 arranged under the control of a browser and an applet which is resident in each web page that is to be monitored. Applets are small applications written in, for example, the Java and JavaScript programming languages which may be downloaded from a website into a user's browser in order to carry out a particular function.
The applet used in the system shown in Figure 2 is currently named Prophet by the applicants and this name shall be used in the description to aid understanding.
It will be appreciated that a system such as that shown in Figure 2 can be used to monitor performance of a large number of websites provided at different servers which are connected to the Internet. However, again for the sake of simplicity in this case, a single website and the performance of the service supported by that website shall be considered.
Thus, in this case, a website is supported by a web server 3 which is accessible via the Internet 2. The website has been set up such that the Prophet applet is contained by each web page 101 which is to be monitored. This means that as a user visits a web page 101 the user's browser automatically downloads and executes the applet. Figure 2 schematically shows web pages 101 displayed in the user's browser and the 20 prophet applet 102 running within the page 101. The user's communication unit 1 under the control of the prophet applet monitors the user's interaction with the web page 101 and returns the information obtained to the central unit 4 which in Figure 2 is shown to comprise a database server 41. A customer c 16 can obtain information from the database server 41 concerning the performance of the website provided at the web server 3.
Each f rame of each web page to be monitored must include a copy of the Prophet applet.
The Prophet applet may be conf igured to perform a range of different monitoring tasks and to select dif f erent types of data. In practice a single version of the prophet applet is made available and included into the appropriate web pages by the author or maintainer of the pages. The configuration is achieved by a configuration message which is sent to the applet from the central unit server 41. Figure 3 is a flow chart schematically showing the steps carried out in monitoring activity associated with a web page in the system shown in Figure 2.
In step 0 a web page and resident Prophet applet is loaded into a user's browser. In step 1 as the applet is activated within the browser an activation notification signal is output under the control of the applet to the central unit server 41.
Each customer (each entity who includes the Prophet applet on their web pages) is supplied with a registration key. This registration key is used to verify web page 101 and central server 41 match. The 17 appropriate key is included in the applet in each page. A copy of the registration key is included in the activation notification. The central server 41 checks to see that a valid key has been received. If there is some mis-match this could indicate an incorrectly set up page or a hacking attempt. If any such mis-match is determined then any further data received from that instance of the applet is ignored by the central server 41.
The activation notification includes an indication of the instant at which the notification is generated in terms of time as kept by the communication unit 1 concerned. The Prophet applet treats this instant as time zero and all later occurrences a logged relative to time zero. The time of this instant, in communication unit time, is received by the central server 41 and compared to a server universal time. The result of the comparison is used to apply an appropriate offset to subsequent timings received from the communications unit 1 such that all occurrences dealt with at the central server 41 are logged in server universal time.
Correct receipt of the activation notification by the central server 41 triggers issuance of a configuration message, at step 2, which is sent to the I is respective communications unit 1. The content of the configuration message is selected by the central unit server 41 on the basis of preselected information received by the server 41. In particular, the configuration will depend on the page being loaded into the browser and may also depend on other factors or information such as the IP (Internet Protocol) address or name of the user, the time of day and/or other user or system information.
The configuration message includes a session ID which can be used to identify the origin of each occurrence which is monitored and sent to the central unit server 41. This session ID uniquely identifies the particular browser being used and the particular page being used so that occurrences relating to a single page can be tied together easily. There is a further advantage in that, if a page is downloaded twice, two different session ID's will be generated. This fact is detectable in the reported data and can indicate some kind of problem such as abnormal reloading behaviour or partial loads taking place because of an annoyingly slow network etc.
At the same time that the applet is signalling its existence in step 1, the contents of the page being loaded into the browser is scanned by the 19 prophet applet in step 3. This scanning step is (WA J facilitated by a suitable JavaScript process. In particular the prophet applet operates by interpreting the HTML of the page concerned as it is loaded and f rom this it develops a page map which includes a list of all of the page components. This is used to allow the applet to quickly analyse any action taken by the user and prepare a record which correctly contextualises the action.
At step 4 a log of occurrences which occur in relation to the web page concerned is generated, each occurrence being given a time stamp relative to zero time. The occurrences logged in step 4 correspond to actions directly taken by the user as well as events -occurring in the browser without the user's direct involvement.
A large range of different occurrences may be logged. As mentioned above the actual occurrences logged will depend on the contents of the configuration message received by the prophet applet. Below is a nonexhaustive list of the occurrences which may be monitored and logged: Start of page load Completion of page load Completion of image or frame load User input data finished User input data started User data Hot Spot, and Hyper Link rollovers 5 Hyper Link selection Mouse position Field selections Browser toolbar usage Next URL selected
User editing of field information User identification (log on name, device, IP address, etc)
In step 5 any sensitive information such as credit card details may replaced by non specific characters such as asterisks and all data is encrypted.
At step 6, the information logged at step 4 and encrypted at step 5 is sent via the Internet 2 to the central server 41 for further processing and reporting as will be described in more detail below. In practice data will be allowed to build up to a predetermined level at the communications unit 1 before being sent to the central server 41. Steps 4 to 6 in Figure 3 will run and re-run continually whilst a page is active but it is not necessary for all three steps to 21 be carried out for a given occurrence bef ore processing of the next occurrence begins. An additional sending of data may be made as a page is left to ensure all data has been output.
As has been discussed above, such a system allows data to be collected which gives an insight to user behaviour and user perceived performance in relation to particular web pages. This information can be used to help to improve the performance or effectiveness of services provided via web pages.
An alternative data capture module is implemented by use of a browser plug-in currently called Vigilante by the applicants which functions in a similar way to the prophet applet but is permanently resident in a user's browser. Thus, in a Vigilante based system, rather than the applet being downloaded onto a user's communication unit each time a web page is loaded, Vigilante is always present in the user's browser and thus can be used to monitor a user's interaction with any web pages visited. This can be achieved either by the Vigilante plug- in directly monitoring a user's activity or by it being arranged to load the prophet applet into each downloaded page. The Vigilante plugin is typically included in the user's browser by the user or the user's system administrator. The 1 22 Vigilante plug-in may be used for monitoring activity in a similar way to as the Prophet applet discussed above but also may be used for security purposes. For example, an Internet Service Provider may offer an incentive to its users to use Vigilante whilst logged on through their service or an employer may use it to monitor activities being carried out by his or her employees. Although the terms applet and plug-in are used herein to aid understanding, it should be noted that when used in its broad sense, the term applet encompasses plug-ins.
As a further alternative a dedicated browser may be provided in which the Vigilante or prophet functionality is incorporated. The dedicated browser is may be used in substantially the same way as existing browsers such as Netscape Navigator and MS Internet Explorer, whilst at the same time providing the monitoring functions discussed above. The browser might be used by a user or a customer to monitor and/or control a user's activity. This may be useful for organisations to retain a certain level of control over staff's access to the intranet or Internet or at least monitor their activities. In such systems it may be preferable to provide a configuration signal from a local server or stored cookie rather than from 23 the central unit server 41.
Data concerning network and server operation may also be monitored by the provision of suitable software. The exact method for monitoring such data will depend on the devices being monitored. However, the use of a configuration message and the use of server universal time is preferable. Further, the data extracted is preferably returned to a central unit for further processing.
In a further developments, a server supported service testing and in particular a load testing tool is provided. The testing system uses the same general architecture as is shown in Figure 1. Figure 4 schematically shows the process used to test the server based system.
Initially one or more users is allowed to use a service supported by the server 3 which is to be tested, and whilst doing so their activity is monitored in step 100 using the prophet or Vigilante systems described above. This monitored activity is then recorded as a script in step 101. In step 102 one or more scripts recorded in step 101 are replayed by end user communication units 1. Typically a large number of scripts will be run on separate end user communications units 1 to simulate the effect of the 24 service experiencing heavy usage. In step 103, as the scripts are replayed the performance of the service is monitored from the point of view of each user, ie at each end user communications unit 1.
The second monitoring step 103 is again substantially the same as that described above in relation to the Prophet applet and Figures 2 and 3.
At step 104 the data gained in the monitoring step is sent to the central unit 4.
Suitable software for controlling the running of scripts and monitoring of behaviour is provided at each communications unit 1. Although this may be implemented in a number of different ways it will be most efficient to use applets or plug-ins substantially the same as the Prophet applet andVigilante plug-in described in detail above. The software used to implement steps 102. to 104 shown in Figure 4 above is currently called Slayer by the applicants and this term will be used below to ease understanding. When Slayer is run on a end user communication unit 1 it announces its presence to the central unit server 41 and awaits further instructions. Further instructions are issued via the central server 41 typically under the control of a systems manager in charge of the server based service to be tested. The necessary user communications units 1 are activated, for example by a systems manager or an automated system, and caused to load a particular web page. Once this has been done interaction with web pages is governed by the recorded scripts which may be downloaded from the central server 41 to the user communication units 1 concerned.
It is to be noted that the scripts to be replayed by Slayer can, and preferably should be recordings of 10. activities carried out by actual users. Thus recorded scripts are likely to include mistakes, incorrect entries, invalid transactions and perhaps arbitrary delays or hesitations. This can give a much more accurate representation of real world traffic.
However, although the scripts are typically recordings of real users and can be used to accurately re-create the actual steps taken, the scripts may be replayed at high speed and/or multiplied to give the effect of many users simultaneously attempting to use the same system. All factors concerning the rate at which data is entered and the time between each transaction etc. may be controlled by the system manager to give the desired test circumstances.
A further advantage of this system over one which relies on artificially generated test programs is that 26 when web page designs are changed, scripts relating to the amended pages can be automatically generated as users use those new pages. If a Prophet or Vigilante based system is being used in relation to the pages concerned there will be a ready made source for recorded scripts. The need for manually re-generating scripts for each version of the site can therefore be avoided.
The following are examples of browser events which may occur as the user interacts with a page. In each case these events may be associated with scripts. This means that such events may be monitored using the Prophet or Vigilante system mentioned above and also may be re-run using the Slayer system.
Load:- occurs when all the content of a particular document has been loaded within a page. Unload:- occurs when a document is removed from a window or frame. Abort:- occurs when page loading is stopped before an image has been allowed to completely load. Error:- occurs when an image does not load properly or when an error occurs during script execution. Select:- occurs when a user selects some text in the text field.
Focus:- occurs when an element receives focus via a 27 pointing device or tab navigation. Change:- occurs when part of a page such as an input region or a text area loses f ocus and its content has been changed since gaining focus.
Submit: - occurs when a form is submitted. Reset: - occurs when a f orm is reset. Blur:- occurs when an element loses focus. Resize:- occurs when a document view is resized. Scroll:- occurs when a document view is scrolled.
The arrangement of the present systems give advantages in that aggregate computing power of a large number of end user communication units may be used in the gathering of data and or the running of scripts to provide a load testing function. This limits the amount of processing power required at the central server 41 and facilitates the gathering of information which is specific to individual end users. To maximise the advantage of this distributed processing effect the format of the data sent to the central server 41 should be such that as little processing as possible is required on the data received at the server.
Although the system is such that data can only be gathered in relation to pages in which the applet is active, it is possible to gain information about what 28 happens to cause the page to be exited. Typically this may be movement to another page or website. The applet may monitor and log the identity of the next site to be visited and also the event which caused such a move, f or example a mouse click on a hypertext link or the direct entry of a URL.
In some circumstances it may be necessary for the applet to be signed using a signature technique which is applicable across all compatible browsers. The authority granted by the certificate should be sufficient to accomplish tasks required for monitoring and logging data. Thus the certificate is preferably sufficient to allow access to all entities within the HTML frame, to obtain access to sub-windows opened by the browser or any contained scripts, and optionally to access the browser buttons and menu activity. If a signed applet is received by an end user communication unit 1 this version of the applet may be retained by the end user communication unit and used for subsequent pages.
Figure 5 schematically shows the internal architecture of the database server 41 supported by the central unit 4. The database server comprises a data packet receiver/ generator 6 which is arranged to output and receive data to and from any data capture 29 module. The data packet receiver/generator 6 facilitates communications between the data capture modules and the database server 41. Amongst other functions, the data packet receiver/generator 6 receives activation notices from data capture modules and returns configuration messages.
The database server 41 further comprises a system maintenance module 7 which provides tools and mechanisms for defining configuration rules for the different versions of data capture modules which are in existence. In relation to the Prophet applet this allows the generation of configuration settings for use with the different instances of the Prophet applet which have been included in web pages by customers.
The tools provided by the systems maintenance module 7 also allow systems managers to populate and manage an originator's database 8 which holds configuration data for all known data capture modules, i.e. all known versions of the Prophet applet amongst other things. The originator's database 8 constructs and issues configuration messages based on the activation notifications which it receives from remote data capture modules via the data packet receiver 6.
The system maintenance module 7 also provides configuration and maintenance tools for the other functions of the database server 41 described below.
The database server 41 includes a data log 9 which holds all the data collected from the data capture modules. Each entry in the data log includes details of the occurrence and a time stamp indicating when the occurrence was lodged in the data capture module. The data log 9 also adds a time stamp indicating the time at which it logged the occurrence. Figure 6 shows an example of the data stored in the data log 9.
As well as data from user browser based data capture modules, the data log 9 also logs utilisation data from data capture modules provided in the network 2 and at servers. Utilisation data will include statistics such as server CPU (central processing unit)utilisation, memory utilisation and network bandwidth usage. Thus this information is of a more generic data than that obtained directly from a user's browser.
The database server 41 further comprises a standard event and utilisation filter module 10 which is used to process the data stored in the data log 9 in order to reduce its volume and present it in a more usable fashion. The standard event and utilisation filter module 10 uses filter rules stored in a filter 31 rule database 11.
A rule wizard system 12 is provided to allow a systems manager to generate filter rules. A filter rule is used to define standard events which are characterised by a sequence of one or more occurrences taking place in a given sequence within a single browsing session.
As described above, an occurrence is constituted by any action carried out by the user or any event within the browser however minor. A collection of data concerning such occurrences is not always useful. The generation of filter rules defining standard events allows the data to be put in a much more usable and compact form. The rules wizard system 12 allows a newly generated filter rule to be tested against a portion of the data stored in the data log 9 to test its function. once a rule has been tested it can be stored in the filter rule database 11.
Each filter rule can have active or inactive status. This means that not.all rules which have been generated must be applied to all incoming data. All data stored in the data log 9 is parsed by all active rules specified in the standard event and utilisation filter module 10.
Each filter rule assigns a name to each standard 32 event and may also specify one or more associated value, such as an elapsed time, an absolute time, or other data to be retrieved from the specific occurrences making up the standard event.
The standard event and utilisation filter module holds a state table for each rule in an active browsing session. Whenever the rule state table signifies that a standard event has occurred, a corresponding event record is written into a standard event log 13. The standard event record includes a time stamp taken from the final occurrence which triggered the standard event creation. moreover, any additional data specified by the rule will be inserted into the standard event record.
Rules may also be defined using the rule wizard system 12 to identify utilisation events. A state table is held in the standard event and utilisation filter module 10 for each utilisation event rule. Whenever the utilisation event rule state table signifies that a utilisation event has occurred, a utilisation event record is written into a utilisation log 14.
The standard event and utilisation filter module 10 also has the function of calculating real time statistical information which it stores in a real time 33 statistics database 15.
Data from the real time statistics database 15 is fed to a real time display module 16 which displays real time statistical data on the performance of websites which are being monitored. The type of information which is provided by the real time display module 16 is high level and thus, for example, might include number of sales per second.
A graph generation module 17 is provided to generate graphs from the data stored in the standard event and utilisation log 13,14. These graphs may be made available via suitable web pages and can represent historic or near real time information. A graph may for example show data concerning the is dif f erent times taken to load a given page on a web site. The system includes a facility such that by appropriately selecting points on a graph, the detailed standard event record may be viewed for that or those points. Furthermore, it is possible to display all occurrences which resulted in that standard event.
Tools provided in the systems maintenance module 7 as well as the f unctionality of the real time display module 16 and graph generating module 17 allow the production of ad hoc reports by customers who are r 34 having their web sites monitored.
It is not essential for customers to gain performance information directly from the central unit 4. Reports may be generated by the administrators of the monitoring system and provided to customers. Such reports may, f or example, be in the form of hard copy or sent electronically.
The database server also includes a session replay module 18 which allows the replay of any session stored in the data log 9. Thus the functionality of the session replay module 18 is similar to, but distinct from, that supplied by the Slayer system described above. The session replay module 18 functions by retrieving all the HTML code stored in the data log 9 and optionally loading any unstored data such as images from the Internet. The module 18 then replays the actions taken by the user. This module gives the ability to review the actions carried out by a particular user which may be useful in identifying a problem which occurred either to assist the user in overcoming the problem or to highlight an aspect of the web page or web site which may be improved.
The systems described above are capable of providing information concerning uses of web sites which is extremely detailed. For example it is possible to provide real time displays and or reports showing the following amongst other things: Number of visitors per unit time, 5 Number of new customers, Number of customers who ordered, Number of customers by location, Number of visitors who tried and failed to order, Total website orders, Total website order value, Website navigation, Usability of website, Apparent speed per customer. Typical route through site, Page hot spots, Time to complete a standard event, Events by time of day, Average and maximum/minimum time to complete transaction, Page load time by page by time of day, Time from loading to exit of page, Exit route from page, Name of user by time of day, IP address of user by time of day.
It is envisaged that such and other data will 36 enable organisations running websites to optimise their services. In particular it is envisaged that it may be possible to reduce cost of providing the service, maximise revenue/transaction rate, highlight and investigate failure modes, understand usability of site, detect unsatisfactory service, detect and correct site design issues, undertake detailed analysis of user behaviour, evaluate success of investments in technology, target IT investment strategies for e-commerce applications.
The following gives an example of the kind of advantages which using a system of the current application can give.
A website owner may be experiencing a large number of incomplete transactions and also retrieving complaints of poor performance from their customer research. By including the Prophet applet on each relevant page of their website and configuring the system to retrieve time of day information on the entry and exit f rom each page as well as recording the exit routes from each page the following type of information may be gained. For example the time taken by users to complete some key pages may be identified. For example it may be determined that whilst 50% of users complete a page in less than 20 seconds nearly 37 20% take more than 2 minutes, whilst 20% never complete the transaction. By more careful analysis of the data it may become apparent that a large proportion of the slow users are using the same Internet service provider and this can indicate that there are problems using this Internet server provider. However, there may be some other reason whilst the other users are having difficulty. It might, for example, be established that a high proportion of users are having to access the help page more than twice whilst attempting to complete the transaction. This could point to a problem in the page design. Moreover, it might be established that a significant proportion of customers begin to fill out a user registration form but fail to complete it. This could suggest that the registration form is too long or too complex. It might alternatively be found that a large number of users leave the site via a banner advert provided on one of the pages. It may then be concluded that the positioning of the advert is disadvantageous.
As another example, it is highlighted that cursor/mouse position within a page can be monitored. This can be used to generate statistical data on cursor position. This in turn can assist in page 38 design, it might f or example, be established that a majority of users seem to be attempting to f ind the "submit" button in the bottom right hand corner of a page even though the button is located elsewhere.
In general terms it will be appreciated how the information provided by systems described in the present application can be of great assistance in improving website design.
In alternatives a rules wizard may not be included but rather rules may be generated and programmed manually.
39
Claims (13)
1 A method of operating an end user communications unit for use in a system for monitoring operation of services provided over a network, the communications unit being arranged to allow reception of services provided over the network and the method comprising the steps of monitoring activity, at the communications unit, associated with a service provided over the network and outputting information so obtained and wherein the service is accessed via at least one web, or other electronic, page and the method comprises the further step of identifying the interactive content of a page as the page is visited and loaded into the communications unit.
is
2. A method according to claim 1 in which the step of identifying the interactive content includes determining information concerning the relevance and/or context of the interactive content.
3. A method according to claim 1 or claim 2 wherein at least some of the information gained in the identifying step is included in the information output by the communications device.
4. A method according to claim 1 in which the step of identifying the interactive content includes determining information concerning the relevance and/or context of the interactive content and the method includes the further step of associating this contextual information with information concerning monitored activities.
5. A method according to any one of claims 1 to 4 in which said details include a log of pointing device position and selecting operation.
6. A method according to any one of claims 1 to 5 in which the monitoring and outputting steps are facilitated by an applet which runs within a browser and runs in a language which is cross-platform.
7. A method according to Claim 6 in which the applet is non-persistent.
8. An end user communications unit f or use in a system f or monitoring operation of services provided over a network, the communications unit being arranged to allow reception of services provided over the network, being arranged to monitor activity associated 41 with a service provided over the network and being arranged to output information so obtained, wherein the. service is accessed via at least one web, or other electronic, page and the communications unit is arranged for identifying the interactive content of a page as the page is visited and loaded into the communications unit.
9. A communications unit according to claim 8 in which identifying the interactive content includes determining information concerning the relevance and/or context of the interactive content.
10. A communications unit according to claim 8 or claim 9 which is arranged to include at least some of the information gained in the identifying step in the information output by the communications device.
11. A communications unit according to claim 8 in which identifying the interactive content includes determining information concerning the relevance andlor context of the interactive content and the communications unit is arranged for associating this contextual information with information concerning monitored activities.
r 1 42
12. A computer program comprising code portions which when loaded and run on computer means cause the computer means to execute the method of any one of claims 1 to 7.
13. A computer program comprising code portions which when loaded and run on computer means, cause the computer means to constitute the apparatus according to any one of claims 8 to 11.
1 1
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0109291A GB2357680B (en) | 2000-03-14 | 2000-03-14 | Monitoring operation of services provided over a network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0006128A GB2356783B (en) | 2000-03-14 | 2000-03-14 | Monitoring Operation of Services provided over a Network |
GB0109291A GB2357680B (en) | 2000-03-14 | 2000-03-14 | Monitoring operation of services provided over a network |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0109291D0 GB0109291D0 (en) | 2001-05-30 |
GB2357680A true GB2357680A (en) | 2001-06-27 |
GB2357680B GB2357680B (en) | 2002-02-13 |
Family
ID=9887596
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0109290A Expired - Lifetime GB2357679B (en) | 2000-03-14 | 2000-03-14 | Monitoring user interactions with services provided over a network |
GB0109291A Expired - Lifetime GB2357680B (en) | 2000-03-14 | 2000-03-14 | Monitoring operation of services provided over a network |
GB0006128A Expired - Lifetime GB2356783B (en) | 2000-03-14 | 2000-03-14 | Monitoring Operation of Services provided over a Network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0109290A Expired - Lifetime GB2357679B (en) | 2000-03-14 | 2000-03-14 | Monitoring user interactions with services provided over a network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0006128A Expired - Lifetime GB2356783B (en) | 2000-03-14 | 2000-03-14 | Monitoring Operation of Services provided over a Network |
Country Status (1)
Country | Link |
---|---|
GB (3) | GB2357679B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2367464A (en) * | 2000-07-19 | 2002-04-03 | Hewlett Packard Co | Web traffic analysis |
FR2839564A1 (en) * | 2002-05-07 | 2003-11-14 | Hewlett Packard Co | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A NETWORK |
WO2008019193A2 (en) | 2006-06-30 | 2008-02-14 | Tealeaf Technology, Inc. | Method and apparatus for monitoring and synchronizing user interface events with network data |
US7373524B2 (en) | 2004-02-24 | 2008-05-13 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user behavior for a server application |
US8042055B2 (en) | 2007-08-31 | 2011-10-18 | Tealeaf Technology, Inc. | Replaying captured network interactions |
EP2822222A1 (en) * | 2013-07-05 | 2015-01-07 | Hitachi Ltd. | Communication system, protocol processing computer, and communication method |
US9207955B2 (en) | 2008-08-14 | 2015-12-08 | International Business Machines Corporation | Dynamically configurable session agent |
US9495340B2 (en) | 2006-06-30 | 2016-11-15 | International Business Machines Corporation | Method and apparatus for intelligent capture of document object model events |
US9635094B2 (en) | 2012-10-15 | 2017-04-25 | International Business Machines Corporation | Capturing and replaying application sessions using resource files |
US9934320B2 (en) | 2009-03-31 | 2018-04-03 | International Business Machines Corporation | Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions |
US10474735B2 (en) | 2012-11-19 | 2019-11-12 | Acoustic, L.P. | Dynamic zooming of content with overlays |
US10474840B2 (en) | 2012-10-23 | 2019-11-12 | Acoustic, L.P. | Method and apparatus for generating privacy profiles |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7366685B2 (en) | 2001-05-25 | 2008-04-29 | International Business Machines Corporation | Method and apparatus upgrade assistance using critical historical product information |
US7596617B2 (en) * | 2001-06-27 | 2009-09-29 | International Business Machines Corporation | Apparatus, method, and business method for enabling customer access to computer system execution data in exchange for sharing the execution data |
US7519704B2 (en) * | 2003-04-28 | 2009-04-14 | International Business Machines Corporation | Filtering non-invasive data collection |
US20060036565A1 (en) * | 2004-08-10 | 2006-02-16 | Carl Bruecken | Passive monitoring of user interaction with a browser application |
GB2427043A (en) * | 2005-05-26 | 2006-12-13 | Moneyexpert Ltd | Online system offering aggregate product and services data with corresponding propensity analysis |
GB2432685A (en) * | 2005-10-26 | 2007-05-30 | Agilent Technologies Inc | Method of detecting an unsatisfactory quality of service |
US8949406B2 (en) | 2008-08-14 | 2015-02-03 | International Business Machines Corporation | Method and system for communication between a client system and a server system |
GB0801516D0 (en) * | 2008-01-28 | 2008-03-05 | Camber Associates Ltd | Data capture system and method |
US8930818B2 (en) | 2009-03-31 | 2015-01-06 | International Business Machines Corporation | Visualization of website analytics |
US8533532B2 (en) | 2010-06-23 | 2013-09-10 | International Business Machines Corporation | System identifying and inferring web session events |
WO2012115981A1 (en) | 2011-02-22 | 2012-08-30 | Tealeaf Technology, Inc. | On-page manipulation and real-time replacement of content |
US9535720B2 (en) | 2012-11-13 | 2017-01-03 | International Business Machines Corporation | System for capturing and replaying screen gestures |
WO2022195240A1 (en) | 2021-03-17 | 2022-09-22 | D4T4 Solutions Plc | Monitoring user interaction with client devices |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999013423A1 (en) * | 1997-09-11 | 1999-03-18 | Narrative Communications Corporation | Tracking user micro-interactions with web page advertising |
EP0908824A2 (en) * | 1997-10-06 | 1999-04-14 | Ncr International Inc. | Managing page activity of web terminals |
EP1026608A2 (en) * | 1999-01-28 | 2000-08-09 | Lucent Technologies Inc. | Method and apparatus for logging web user activity using client-side support |
EP1045547A2 (en) * | 1999-03-09 | 2000-10-18 | Netzero, Inc. | Monitoring of individual internet usage |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6085243A (en) * | 1996-12-13 | 2000-07-04 | 3Com Corporation | Distributed remote management (dRMON) for networks |
US5796952A (en) * | 1997-03-21 | 1998-08-18 | Dot Com Development, Inc. | Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database |
EP0952522B1 (en) * | 1998-04-22 | 2011-08-24 | Nippon Telegraph And Telephone Corporation | Method and device for acquiring usage data of an application |
WO2000055768A1 (en) * | 1999-03-16 | 2000-09-21 | Webcriteria, Inc. | Determining objective effectiveness of a web site by mathematical modeling of scenes |
-
2000
- 2000-03-14 GB GB0109290A patent/GB2357679B/en not_active Expired - Lifetime
- 2000-03-14 GB GB0109291A patent/GB2357680B/en not_active Expired - Lifetime
- 2000-03-14 GB GB0006128A patent/GB2356783B/en not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999013423A1 (en) * | 1997-09-11 | 1999-03-18 | Narrative Communications Corporation | Tracking user micro-interactions with web page advertising |
EP0908824A2 (en) * | 1997-10-06 | 1999-04-14 | Ncr International Inc. | Managing page activity of web terminals |
EP1026608A2 (en) * | 1999-01-28 | 2000-08-09 | Lucent Technologies Inc. | Method and apparatus for logging web user activity using client-side support |
EP1045547A2 (en) * | 1999-03-09 | 2000-10-18 | Netzero, Inc. | Monitoring of individual internet usage |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2367464A (en) * | 2000-07-19 | 2002-04-03 | Hewlett Packard Co | Web traffic analysis |
FR2839564A1 (en) * | 2002-05-07 | 2003-11-14 | Hewlett Packard Co | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A NETWORK |
US7373524B2 (en) | 2004-02-24 | 2008-05-13 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user behavior for a server application |
US9495340B2 (en) | 2006-06-30 | 2016-11-15 | International Business Machines Corporation | Method and apparatus for intelligent capture of document object model events |
WO2008019193A2 (en) | 2006-06-30 | 2008-02-14 | Tealeaf Technology, Inc. | Method and apparatus for monitoring and synchronizing user interface events with network data |
EP2038752A4 (en) * | 2006-06-30 | 2009-07-15 | Tealeaf Technology Inc | Method and apparatus for monitoring and synchronizing user interface events with network data |
EP2038752A2 (en) * | 2006-06-30 | 2009-03-25 | Tealeaf Technology, Inc. | Method and apparatus for monitoring and synchronizing user interface events with network data |
US8127000B2 (en) | 2006-06-30 | 2012-02-28 | Tealeaf Technology, Inc. | Method and apparatus for monitoring and synchronizing user interface events with network data |
US9842093B2 (en) | 2006-06-30 | 2017-12-12 | International Business Machines Corporation | Method and apparatus for intelligent capture of document object model events |
US8042055B2 (en) | 2007-08-31 | 2011-10-18 | Tealeaf Technology, Inc. | Replaying captured network interactions |
US9207955B2 (en) | 2008-08-14 | 2015-12-08 | International Business Machines Corporation | Dynamically configurable session agent |
US9787803B2 (en) | 2008-08-14 | 2017-10-10 | International Business Machines Corporation | Dynamically configurable session agent |
US10521486B2 (en) | 2009-03-31 | 2019-12-31 | Acoustic, L.P. | Method and apparatus for using proxies to interact with webpage analytics |
US9934320B2 (en) | 2009-03-31 | 2018-04-03 | International Business Machines Corporation | Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions |
US9635094B2 (en) | 2012-10-15 | 2017-04-25 | International Business Machines Corporation | Capturing and replaying application sessions using resource files |
US10523784B2 (en) | 2012-10-15 | 2019-12-31 | Acoustic, L.P. | Capturing and replaying application sessions using resource files |
US10003671B2 (en) | 2012-10-15 | 2018-06-19 | International Business Machines Corporation | Capturing and replaying application sessions using resource files |
US10474840B2 (en) | 2012-10-23 | 2019-11-12 | Acoustic, L.P. | Method and apparatus for generating privacy profiles |
US10474735B2 (en) | 2012-11-19 | 2019-11-12 | Acoustic, L.P. | Dynamic zooming of content with overlays |
EP2822222A1 (en) * | 2013-07-05 | 2015-01-07 | Hitachi Ltd. | Communication system, protocol processing computer, and communication method |
Also Published As
Publication number | Publication date |
---|---|
GB2357680B (en) | 2002-02-13 |
GB2356783B (en) | 2001-12-05 |
GB0109291D0 (en) | 2001-05-30 |
GB2357679A (en) | 2001-06-27 |
GB0109290D0 (en) | 2001-05-30 |
GB0006128D0 (en) | 2000-05-03 |
GB2357679B (en) | 2002-02-13 |
GB2356783A (en) | 2001-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1264261B1 (en) | Monitoring operation of and interaction with services provided over a network | |
GB2357680A (en) | Monitoring of services provided over a network with determination of interactive content of web pages | |
CA2656539C (en) | Method and apparatus for monitoring and synchronizing user interface events with network data | |
US8365188B2 (en) | Content management | |
US6631411B1 (en) | Apparatus and method for monitoring a chain of electronic transactions | |
US6286046B1 (en) | Method of recording and measuring e-business sessions on the world wide web | |
JP3651873B2 (en) | Computer system configuration change tracking method | |
US20100318976A1 (en) | Method and system for constructing a customized web analytics application | |
EP2306277A1 (en) | System and method for controlling display windows | |
US20020123966A1 (en) | System and method for administration of network financial transaction terminals | |
US20100306333A1 (en) | Methods, systems, and computer program products for providing website management services | |
US20050021736A1 (en) | Method and system for monitoring performance of distributed applications | |
US20020103896A1 (en) | HTTP transaction monitor | |
WO2011054024A1 (en) | A usability testing tool | |
KR20080070636A (en) | Obtaining server usage information | |
WO2020086969A1 (en) | Methods and systems for performance testing | |
US7716632B2 (en) | Automated software robot generator | |
US7047277B1 (en) | System and computer-implemented method for creating configuration files for web transaction tests | |
JP4048736B2 (en) | Failure analysis support method and apparatus | |
CN111371643A (en) | Authentication method, device and storage medium | |
Cooper | Design considerations in instrumenting and monitoring web‐based information retrieval systems | |
CA2474735C (en) | Method, apparatus, and system for capturing, processing, and/or playing selected data exchanged between a server and a user | |
AU2003214926A1 (en) | Method, apparatus, and system for capturing, processing, and/or playing selected data exchanged between a server and a user | |
Kim et al. | Automatic monitoring of service reliability for web applications: a simulation‐based approach | |
Pham | Real user monitoring for internal web application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20180308 AND 20180314 |
|
PE20 | Patent expired after termination of 20 years |
Expiry date: 20200313 |