Simplicity for the end user and integration and consolidation of the historical data are key principles that the modeling approach should help provide.
为终端用户提供的简单性以及历史数据的集成和联合是建模方法应该帮助提供的关键原则。
As you can see, the delay between key releases are relatively regular for this particular user and this particular text.
正如您所见,对于此特定用户和此特定文本,按键释放之间的延迟是相对有序的。
One key feature for software to be used worldwide is the ability to work in the native language of the user.
软件要想在全球得到广泛使用,一个关键特性是它需要能够以用户的本地语言进行操作。
The key to selecting the right technology is to let the application requirements drive the technology choice for the user experience.
选择正确技术的关键是,让应用程序的需求决定对用户体验技术的选择。
In particular, it supports multiple primary key fields and exposes some user interface enhancements and a new model for handling and canceling events.
特别是,它支持多个主键字段,公开了一些用户界面的改进功能和一个处理与取消事件的新模型。
The key for us is that they enable rapid prototyping with user experience designers.
对我们来说,关键是它们能够与用户体验设计者一起快速的搭建原型。
The characters and story are two key factors for hooking and retaining your user base.
人物和故事是留住你的用户群的两个关键因素。
A public key infrastructure (PKI) is a means for associating public keys with the respective user identities using a Certification Authority (ca).
公钥基础设施(PKI)是将公钥与使用证书颁发机构(CA)的相应用户标识进行关联的一种方法。
By requiring that a form submission contains a valid authorization key before processing, you make it much more difficult for someone to forge a form submission for another user.
通过要求表单提交包含有效的认证密钥,然后才能处理,可以使攻击者更难伪造其他用户提交的表单。
Both the valet key and ATM CARDS are good metaphors for OAuth from a user perspective.
无论是仆从钥匙或者ATM卡,从用户角度来看都是对OAuth很好的比喻。
Remember these key steps for developing a portlet user interface to a human task in a remote business process.
请记住这些用于为远程业务流程中的人工任务开发Portlet用户界面的关键步骤。
This article analyzes some of the key features of Linux 2.6 for the avid Linux user, and discusses various changes that might be of interest to driver developers.
本文为关注Linux的用户分析了 Linux 2.6的一些重要特性,并且讨论了驱动程序开发人员可能会感兴趣的多方面的变化。
The importance of user experience, user interface and data visualization as tools for maximizing the value of data assets across each of IA Ventures' key themes.
用户体验,用户界面以及数据形象化对于数据资产价值的最大化尤为重要,这也贯穿于IA Ventures公司的每个关键要素。
The aims and key requirements for any SCCM system will vary depending upon the role and tasks of the individual user.
任何一个SCCM系统的目标和关键请求都将随着单个用户的角色和任务而变化。
EnSTratus offers enterprise cloud encryption, key management, a user management for the cloud, and many other solutions.
EnSTratus提供了企业云加密、密钥管理、一个云用户管理和其他结局方案。
For example, if a user selects one component and then holds down the shift key and selects another three, the method is called for each addition to the selection list.
例如,如果用户选择了一个组件,然后按住shift键并选择另外三个组件,则每次向选择列表中进行添加时,都会调用该方法。
For instructions on creating a key database and a complete list of command line options, refer to GSKCapiCmd User Guide.
有关创建密钥数据库的详细步骤以及命令行选项的完整列表,请参阅gskcapicmd用户指南。
Keylogin then prompts the user for the Secure RPC password and then decrypts the secret key of that user.
然后,keylogin提示用户输入安全RPC密码,然后解密该用户的机密密钥。
Each string passed to mkpasswd is built level by level from a single key dwell time all the way up to a dwell time for each recorded letter in the user name.
传递给mkpasswd的每个字符串都是从单个按键停顿时间一直到用户名中每个记录字母的停顿时间逐级构建的。
Of course, if you use per-user and per-instance SSH keys, then Pageant can only provide the key for the second and subsequent connections to each instance - but that's the cost of tighter security.
当然,如果对于每个用户和每个实例使用不同的ssh密钥,Pageant只能为对每个实例的第二次和后续连接提供密钥,但这是实现更高的安全性要付出的代价。
The response from Amazon contains the private key for the new key pair. The PHP page displays that information with a message to the user.
来自Amazon的响应包含新密匙对的私有密匙,php页面通过向用户发送一条消息来显示该信息。
The OpenSSH client user ram is all set for Public Key authentication to user laxman on the OpenSSH server with EFS login. Verify the same with ssh login from client
现在准备使用EFS登录由OpenSSH服务器上的用户laxman 对 OpenSSH客户机用户ram 进行公钥认证。
VersionUserKey: the unique key for the user who caused the revision update.
进行版本更新的用户唯一码。
(a key store for an user is created when a password is set for that user).
(在为用户设置密码时,将创建该用户的密钥存储库)。
For — delete, handle either bucket deletion (non-recursive so the user has to remove all the keys in the bucket first) or key deletion within a bucket.
对于——delete,它处理bucket删除(非递归的,因此用户必须先删除bucket中的所有密匙)或bucket中的密匙删除。
Because that allows for the user to type a lot of text; then, a second after the user presses the last key, the search will run.
因为这将允许用户输入大量的文本;然后,当用户按下最后一个键时,第二种方法将运行搜索。
For example, the key could be a unique user ID, a stock symbol or, in our case, a zip (postal) code.
例如,主键可以是一个唯一的用户ID、一个股票符号,在我们的实例中,主键是一个邮政编码。
The business user can also define the key performance indicators (KPIs) for each milestone defined in the milestone model described earlier.
业务用户还可以为此前介绍的里程碑模型中定义的每个里程碑定义关键性能指标(KPI)。
In the initial example above, the key data was user profiles, which could be distributed (partitioned) across a set of machines for parallel processing.
在上例中,关键数据是用户配置文件,可以跨一组机器分布(分区)以进行并行处理。
Because performance, reliability and user experience really matter with mobile devices, making integration key, which is a conundrum for the open source approach.
因为性能、可靠性和用户体验对移动设备用户而言非常重要。如何同时保证这三要素是开源方案面临的难题。
应用推荐