这些应用程序还可以记录他们的日常活动。
然后,应用程序可以使用这个参数对用户进行授权,并对用户的活动进行审计记录。
The applications can then use this parameter to authorize users and provide an audit trail of user activity.
对于在目标系统内注册的每个调度程序,相应的配置及动作都将被记录,诸如连接花费的时间、活动过程的数量和请求持续时间等信息会被保存。
For each dispatcher registered in the target system, the configuration and activity will be logged, saving information such as time taken to connect, number of active processes and request duration.
数据库活动报告对于在测试环境中记录新的或变更的应用程序很有用。
Database activity reports can also be useful for profiling a new or changed application in a test environment.
请求要么记录在变更控制系统中,要么对于更不正式的项目来说,特别是在极限程序设计项目中,记录在卡片上或活动挂图上。
Requests are recorded either in change control systems, or even for more informal projects, particularly within eXtreme Programming projects, on CARDS or flip charts.
符合您前面设置的应用程序的任何活动都将会记录下来。
Any activity in the application that fits the profiling Settings that you specified earlier will now be recorded.
在关键的计算机应用程序的生存期中,日志记录是一件非常重要的活动,特别是当故障的症状并不十分明显时。
Logging is a very important activity in the lifetime of critical computer applications, especially when symptoms of failures aren't readily apparent.
例如,您可能使用Polling活动在系统中搜索新的销售订单记录,然后自动向会计应用程序发送数据副本以生成帐单。
For example, you might use a Polling activity to search for new sales order records in your system and then automatically send a copy of the data to your accounting application to generate a bill.
在阶段2(提交阶段)中,WebSphere事务管理程序略过与资源管理程序的通信,并且它并不冒险强制或记录任何与这个资源管理程序相关的活动。
In phase 2 (commit phase), WebSphere transaction manager skips the communication with this resource manager, and it will not disk force or log any activities related to this resource manager.
接下来,创建在应用程序,将使用该活动记录模式模型数据库表中的类。
Next, create the classes in your app that will use the active record pattern to model a database table.
记录系统活动的程序也能做类似的修改,从而当系统管理员检查日志时,尽管系统已处于危险之中,但一切看来都正常。
Programs that log system activities can be similarly modified, so that when the systems administrator checks the logs, everything looks normal despite the fact that the system has been compromised.
记录系统活动的程序也能做类似的修改,从而当系统管理员检查日志时,尽管系统已处于危险之中,但一切看来都正常。
Programs that log system activities can be similarly modified, so that when the systems administrator checks the logs, everything looks normal despite the fact that the system has been compromised.
应用推荐