将版本控制配置为使用代理服务器。
这种逻辑对于大量更新访问控制配置的情况特别有用。
This logic especially makes sense in scenarios with many updates of the access control configuration.
访问控制配置可防止被允许在这个时候您的请求。
Access control configuration prevents your request from being allowed at this time.
中介策略平等地提供实际的管理能力,允许以完全动态的方式控制配置。
Equally, mediation policy gives real administrative power in controlling configuration in a truly dynamic fashion.
为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。
The principal security requirement is that untrusted code should not be able to change the logging configuration.
这些控制领域包括控制内容、控制配置、控制部署和控制用户。
These include controlling content, controlling configuration, controlling deployment, and controlling users.
要完全控制配置,可以在模式中指定一些配置值并在参数上使用“锁”来防止修改。
You can completely control the configuration by specifying the configuration values in the pattern and using the "lock" on the parameters to prevent modification.
有几个额外的设置,根据其它不产生任何影响,这些都是使用老缩放,和控制配置。
There are a couple of extra Settings under misc which don't have any effect, those are Use HW scaling, and Control config.
利用双向串行端口,可在软件中进行增益设置、信号极性选择和RTD电流控制配置。
Gain Settings, signal polarity and RTD current control can be configured in software using the bidirectional serial port.
图7:可以将RAM的访问控制配置为,允许同一个用户在多个社区中扮演拥有各不相同的权限和约束的多个角色。
Figure 7: Access control for RAM can be configured to allow the same user to have multiple roles across multiple communities with varying permissions and constraints.
您还可以利用命令行界面来更改脚本包的访问控制配置,甚至使用脚本包的ID从此设备删除一个脚本包,如图10所示。
You can also leverage the command line interfaces to change the access control configurations of script packages, and even delete a package from the appliance using its ID, as shown in Figure 10.
ESB和中心辐射型(hub - and - spoke)解决方案都集中控制配置,比如服务交互的路由、服务命名等等。
Both ESB and hub-and-spoke solutions centralize control of configuration, such as the routing of service interactions, the naming of services, and so forth.
PQ96873这种逻辑对于大量更新访问控制配置的情况特别有用(尤其是在角色分配和取消分配时);否则,应该为false。
PQ96873 This logic especially makes useful in scenarios with many updates of the access control configuration (especially role assignments and unassignments), otherwise, should be false. false
通过建立倒立摆系统的数学模型,应用状态反馈控制配置系统极点设计倒立摆系统的控制器,实现其状态反馈,从而使倒立摆系统稳定工作。
The mathematical model of inverted pendulum system is built, and a controller is designed based on the pole placement method with full state feedback to make the inverted pendulum system work stably.
该方法由CPLD控制配置过程,EPROM存储配置文件,实现了FPGA的被动串行配置,增强了数控系统的保密性、简化了系统电路。
The passive serial configuration of FPGA is controlled by CPLD. EPROM is selected to store the configuration program. It can improve encryption of the CNC system, and simplify the circuit.
配置管理包括四个独立的任务:识别、控制、状态会计和审计。
Configuration management consists of four separate tasks: identification, control, status accounting, and auditing.
这两者都控制环境中的配置和选项。
Both control the configuration and options in the environment.
这种灵活性功能极其强大,但它在配置控制和管理方面也有其自身的困难。
This flexibility is extremely powerful but presents its own challenges in the form of configuration control and administration.
通过谨慎的控制和配置,基础设施的各个部分可以在产品环境中执行计划内或计划外移除。
Through careful control and configuration, various parts of the infrastructure can be removed from the production environment on a planned or unplanned basis.
访问控制规则被配置为安全规则。
如果资源由使用者直接控制,则配置选项一般是这些资源的一个较小子集。
Configuration options are usually a smaller subset than what they would be if the resource was controlled directly by the consumer.
团队支持组件负责提供版本控制和配置管理支持。
The team support component is responsible for providing support for version control and configuration management.
这段配置控制了SOAP扩展的WSDL缓存特性。
This configuration section controls the WSDL caching feature of the SOAP extension.
配置服务使您能控制邮件设置、日志设置和其他配置参数。
The configuration services enable you to control the mail Settings, log Settings, and other configuration parameters.
控制传输:这些是一些短的数据包,用于设备控制和配置,特别是在设备附加到主机上时。
Control transfers: These are short data packets for device control and configuration, particularly at attach time.
除了需要控制映像内容、配置和部署外,还需要控制用户的权限。
In addition to the need to control image content, configuration, and deployment, is the need to control who can do what.
panel:控制面板的配置。
要控制部署配置,可以使用WebSphereCloudBurst模式编辑器来创建模式。
To control deployment configurations, you create patterns using the WebSphere CloudBurst pattern editor.
LoggingPermission用来控制日志配置的修改。
A new security permission LoggingPermission is defined to control updates to the logging configuration.
步骤4-配置捕获控制表的配置文件。
Step 4 - Configure the profile for the capture control tables.
应用推荐