服务兼容性根据策略来确定。
根据策略配置Acegi的拦截过滤器。
Configuring Acegi's interceptor filter according to the policy.
根据策略,来提供商a应应答客户端。
According to the policy, provider a should not answer the client.
将根据策略在写入时自动加密数据,而在读取时自动解密数据。
Data is automatically encrypted when writing, and decrypted when reading, based on the policy.
系统可以根据策略做出各种反应,包括生成警告和实时地阻止事务。
The system can respond with a variety of policy-based actions, including generating an alert and blocking the transaction in real time.
使用爬虫自动存档和检索——根据策略中的存档规则设置支持支持。
Automatic archiving and retrieval with crawlers - based on archive rules set in policies Supported Supported.
根据策略手册,“列出在除非寻常安装以外的任何安装中与此软件包一起出现的软件包。”
According to the policy manual, "list packages that would be found together with this one in all but unusual installations."
信条4:服务兼容性根据策略来确定。这条还算不错:策略的类型和范围可以塑造一个架构。
Tenet 4: Service compatibility is based upon policy This is a good start: the types and scope of policy can shape an architecture.
可以应用的策略有多种,PD P并没有评估所有的策略,而是根据策略目标选择相关的策略进行评估。
A number of policies may be available: the PDP does not evaluate all of them; only the relevant ones are chosen for evaluation, based on the policy target.
根据策略分析报告公司提供数据显示,智能手机出货量比前一季度提高44%,达到2780万台,几乎是一年前的4倍。
Shipments of smartphones jumped 44 percent from the preceding quarter to 27.8 million units, up nearly four times from a year ago, according to research firm Strategy Analytics.
许多服务类别很可能需要相同类型的请求处理,因此理想情况下,您需要根据策略执行服务处理,而不是将其编码到每个请求中。
There are likely to be categories of service that require the same types of request handling so ideally, you want to impose request handling based on policies rather than code it into each request.
根据这篇文章的观点,由于植物无法逃离危险,所以将能量投入到能够识别威胁并感知疼痛的身体系统中,是一个非常糟糕的进化策略。
Plants can't run away from danger, so investing energy in a body system which recognizes a threat and can feel pain would be a very poor evolutionary strategy, according to the article.
它们只根据度量提供刺激,忽略了策略目标和实际结果。
They provide incentives based solely on measurements, losing sight of strategic goals and actual results.
在这种情况下,将根据所配置的策略来采取行动。
In this case, the action will be taken on the basis of the policy configured.
有了决策表,我们就可以根据测试策略轻松的添加和删除条件。
With a decision table, it is easy to add and remove conditions, depending on the test strategy.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
提前制定策略,以便根据专有名称和具体证书撤销访问。
Establish a strategy in advance for revoking access by distinguished name as well as by individual certificate.
根据临床问题设计检索策略。
Designs a search strategy on the selected clinical question.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Next, measure the level of business risk associated with your assets according to your security policies.
由于存储系统和存储类之间存在关联,因此对象将根据移植策略中设置的规则移动到指定存储系统中。
Since there is an association between storage system and storage class, objects will move along the designated storage system according to the rule set in migration policy.
ARFM根据对每个服务策略中的请求流的观察进行预测和计算。
ARFM makes predictions and calculations based on the observations of the traffic in each service policy.
正如第2节中提到的,策略管理提供一种根据企业制定的策略分配IT资源的机制。
As stated in section 2, policy management provides a mechanism to allocate IT resources according to defined policies established by the enterprise.
通过使用上面的示例,“货币”余额可以根据银行的策略设置为不同的值。
Using the example above, the balance "currency" can be set to different values based on the bank's policy.
您应该更新主题策略并根据需要在XDIME元素上指定新的样式类。
You should update the theme policies and specify new style classes on XDIME elements as needed.
例如,可以使用存储策略筛选器根据存储区域的最大大小来选择存储区域。
For example, you could use a storage policy filter to select a storage area based on the maximum size of the storage area.
该函数根据预定义的策略验证操作能否继续进行。
This function validates that the operation may proceed based on the predefined policies.
以后可以根据安全策略的要求逐渐放松此用户的安全限制。
Then one can gradually lift the security of that user as your security policy demands.
我们将会看到AIX中创建的文件在IBMSONAS系统中如何根据已定义的策略自动放置、迁移和删除。
We see how the files created from AIX client are placed, migrated, and deleted automatically on IBM SONAS system based on the policies defined.
这是一种很聪明的技术,也是一项合理且有理论根据的策略。
It's a very clever technique and is a strategy that is evidence-based and rational.
只要消息没有得到确认,或者,根据RM策略断言,没有达到其不活动超时时间,特定的消息都可以用于发送。
A particular message will be available for sending as long as it is not acknowledged or its inactivity time out, as per the RM Policy Assertions, has not been reached.
应用推荐