没有被完全记录的那个事务不能被滚回,为保护数据库完整性,操作系统结束该事务并将它自动滚回。
A transaction that is not fully recorded cannot be rolled back. To preserve database integrity, the operating system ended the transaction and rolled it back automatically.
数据保护的质量必须表示为相应范围内的策略。
Qualities of data protection have to be represented as policies within ranges.
这种政策在某种程度上有计划的保护了诉讼法,也为美国做出了很大的贡献。2007年剖腹产的比率上升到了将近32%,这是这几年唯一公开的数据。
Such policies, designed in part to protect against litigation, have contributed to the rise of the U.S. cesarean rate to nearly 32% in 2007, the most recent year for which data are available.
在这三种方法中,前两个可以无缝地保护数据,但是必须为这种设置指定专用的分区。
Out of these three options, the first two can be used to seamlessly secure the data, but you have to dedicate a partition for this setup.
撒谎涉及大脑多重思维,例如,为保护自己不受谴责,要整合分析信息源和编造虚假数据。
Lying involves multiple brain processes, such as integrating sources of information and manipulating the data to their advantage.
LotusScript被设计为线程安全的,这意味着它使用信号量保护数据结构,从而保护装载的每个LotusScript实例。
LotusScript is designed to be thread-safe, which means it USES semaphores to protect data structures so that each loaded instance of LotusScript is protected.
如果您想要了解更多关于CISO与CEOs安全视角的当前状态的信息,那么您可以阅读“为数据保护构建业务用例”报告(参见参考资料)。
To learn more about the current state of security perspectives between CISOs and CEOs, read the "Building the Business Case for Data Protection" report (see Resources).
为提高速度(不存在错误检测以外的数据保护),您可以跨设备进行条带化(RAID0)。
For speed (but no data protection other than error detection), you can employ striping across devices (RAID 0).
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
这个标准为每扇区都增加了一个数据完整性字段(DIF)以保护介质上的数据。
This standard adds a data integrity field (DIF) to each sector to maintain data protection on the medium.
这可以保证数据在存储后,或者未经修改返回,或者被标识为“可疑”—非常类似于受保护的HDD。
This ensures that, once stored, data is either returned unmodified, or is identified as being "suspect" - much like data on HDDs is safeguarded.
通过清理数据并忽略被错误提交的数据,已经为保护应用程序奠定了良好的基础。
By cleaning up your data and ignoring data submitted improperly, you have made excellent first steps in securing your application.
可以把过载保护值设置为 50%,从而有效地防止数据库过载。
The overload protection value could then be set to 50% in order to effectively protect the database from overload.
LotusExpeditor为运行于客户端上的应用程序和应用程序数据提供保护,方式如下。
Lotus Expeditor secures the applications and application data running on the client by doing the following.
但Google不仅收集了匿名和群体性数据,而且还收集了为受保护的个人信息,其中包括电子邮件和照片。
However, it collected not just anonymous and aggregated info, but unprotected personal information which may include emails and photographs.
客户通常会在数据中心使用交换磁盘或 LUN-level 技术来为计划内和计划外中断提供本地保护,但不涉及到磁盘子系统。
Typically, clients use switched disk or LUN-level switching within a data center to provide local protection from planned and unplanned outages not involving the disk subsystem.
为保护此数据,我们决定加密整个sdoWrapper服务数据对象。
To protect this data, we decided to encrypt the whole sdoWrapper service data object.
在测试场景中,我们可以避免为Notes数据库指定用户ID和口令,因为我们是将它构建为本地的、不受保护的数据库。
We were able to avoid specifying a user id and password for the Notes database in our test scenario because we built it as a local, unprotected database.
mashup应用程序通过 mashup hub访问受保护的feed,mashup hub充当一个代理,为系统提供适当的凭证,以允许访问数据源。
The mashup application accesses the protected feeds through the mashup hub, which acts as a proxy providing the appropriate credentials to systems to enable the data source to be accessed.
本文概述了如何使用ISD的ssl特性来为传输中的数据提供保护。
This article provides an overview of how you can use the SSL feature of IDS to secure the data in transit.
为解决上述问题,我们可以采用数据库加密的方式来保护数据。
To solve these problems mentioned above, we can protect data by database encrypting.
连续数据保护和远程复制的策略,也为他们解决在备份策略,一个很重要的今天的主题结合起来。
Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategies-a very important topic today.
为减轻微机母线主保护CPU的工作负荷,开发一个以80386ex为核心的智能打印板完成数据处理及打印任务。
An intelligent printer card is designed to reduce the main CPUs working load of digital bus protection, which is based on80386EX and used to implement the tasks of printing data processing and print.
我的意思是它们是非常,非常巨大的,数字,用来为保护我们的数据。
I mean, these are huge, huge, Numbers that humans are now using to protect their data.
为您的数据中心制订一个“绿色”计划有助于节约能源和保护我们的环境,但“绿色”究竟表示什么意思呢!
Establishing a "green" program for your data center helps to save energy and preserve our environment, but what does "green" mean to you.
以文物保护信息资源数据中的空间资源数据为基础,结合GIS技术进行了系统的结构搭建。
This article is based on the space resource data from the cultural relic protection information data and establishes the systematic framework combining GIS technology.
差动保护装置时钟设定影响通信数据,为尽量减少误码对差动保护的影响,应根据不同的通道方式,采用不同的最佳时钟设置。
The clock device setting of the differential protection affects the data communication, and in order to reduce the influences, the optimal clock settings for different channels should be used.
当设置好这些数据结构,代码段以及系统寄存器之后,可以通过设置控制寄存器CR0的PE位(第0位)为1来进入保护模式。
With these data structures, code modules, and system registers initialized, the processor can be switched to protected mode by loading control register CR0 with a value that sets the PE flag (bit 0).
当设置好这些数据结构,代码段以及系统寄存器之后,可以通过设置控制寄存器CR0的PE位(第0位)为1来进入保护模式。
With these data structures, code modules, and system registers initialized, the processor can be switched to protected mode by loading control register CR0 with a value that sets the PE flag (bit 0).
应用推荐