A system accesses a log of events on more than one computing system and
scans these logs in an effort to determine the likely cause of various
items of interest, events, or problems. These items of interest often
include improper or frustrating behavior of a computer system, but may
also include delightful or beneficial behaviors for which a user, group
of users, company, service, or help desk seeks a cause. Once the likely
source of the item of interest is found, a test may be performed to
confirm the source of the problem and warning or corrective action taken.