社区功能要处理来自不同设备类型的访问请求。
Community functions handle access from different device types.
必须拒绝所有来自媒体的访问请求。
访问请求的目录只能从本地网络。
Access to the requested directory is only available from the local network.
我们将在30天内响应所有的访问请求。
ACCESS准则(任何访问请求)允许优化器选择方法。
The access guideline (any access request) allows the optimizer to choose the access method.
租户的访问请求应该路由或分派到对应的过程模板或实例。
The access requests of a certain tenant should be routed or dispatched to its corresponding process templates or instances.
如果独占访问请求的资源没有被锁定,则这个方法锁定它。
If a request for exclusive access to the resource is unlocked, this method locks it.
因此对用户的访问请求进行控制是非常必要的。
此部分描述如何在wi中加载应用程序,以及批准用户访问请求的持续工作。
This section describes getting the applications set up within wi and the ongoing function of approving user requests for access.
结合确定性推理和可能性推理,描述了如何判定访问请求的算法。
Based on certainty and possibility reasoning, an algorithm to determine whether an access request is authorized is proposed.
IXAND访问请求元素要求优化器使用indexanding访问表。
The IXAND access request element directs the optimizer to use index anding to access a table.
假设成功认证用户或组,事务授权将检查用户或组是否被授权访问请求的事务。
Assuming that the user or group is successfully authenticated, transaction authorization checks whether the user or group is granted access to the transaction that is being requested.
JPA应用程序在第一个访问请求和后续修改请求之间并没有保持分离对象的引用。
The JPA application holds no reference to the detached objects between the first access request and the subsequent change request.
当主机要访问SAN存储设备,它发送一个基于块的存储设备的访问请求。
When a host wants to access a storage device on the SAN, it sends out a block-based access request for the storage device.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
The other technology LDAP can provide a secure model to control access requirement according to identity information.
P1VoidReply访问应答消息的方式必须与P1S1Transform访问请求消息相同。
P1VoidReply must access the reply message in the same way P1S1Transform accessed the request message.
在TCPPorttolistenon字段中,输入服务为获得访问请求而侦听的TCP端口。
In the TCP port to listen on field, enter the TCP port that the service is listening on for access requests.
谷歌一下“信息过量”,立马就过量的信息映入你的眼帘:0.05秒内就有超过7百万次访问请求。
GOOGLE "information overload" and you are immediately overloaded with information: more than 7m hits in 0.05 seconds.
为了说明XACML的不同组件,我们将以一个具体的访问请求为例,创建所需的全部 XACML 组件。
To illustrate the various XACML components, I'll show you how to take a specific access request and create all the XACML components required to process it.
网关认证主要用于认证从本地网络访问外部网络的用户,这要求所有的网络访问请求必须穿过网关系统。
Gateway authentication is mainly used to authenticate users who get access to external network from a local network. In this case, all of network access requests must go through a gateway system.
需要访问数据库的进程将数据库访问请求放入队列中,由另一个数据库访问模块进行实际的读取数据操作。
Need access to the database will process database requests for visits Add to queue from another database access module to carry out the actual data read operation.
高效的视频服务器,要求能在有限的系统资源下,最大化地服务于访问请求的同时,能够提供更加可靠的服务。
Highly efficient video server refers to the one that can maximize the service to request on the condition of limited system resources, and at the same time, can provide more reliable services.
一般来说,如果两个或多个用户以写模式并发访问文件,第一个用户保证能以写模式访问文件,其他用户的写模式访问请求将排队。
In general, if two or more users access the file in write mode concurrently, the first user is granted write mode access to the file and the remaining users write mode access requests are queued.
该解决方案通过建立统一的数据模型,使用元数据与多数据库系统实现了对分布的异构的空间数据的统一访问请求服务。
Based on the unified data modeling, this resolution realizes the uniform request service to distributed heterogeneous spatial data by metadata and multi-database system.
模型中需要通过决策检测器对新的请求进行决策,以决定是否允许执行访问请求,这样做的目的就是来准确地区分合法请求和非法请求。
The model use the model detector decision-making the new request to decide whether to allow the access request, this goal is to accurately distinguish between legitimate requests and illegal requests.
要想动态地配置CXF,需要使用这个隐含的类型并把代理转换为bindingprovider类,然后通过类型转换访问请求上下文属性映射。
To configure CXF dynamically, you need to make use of this implied typing and cast the proxy to the BindingProvider class, then access the request context property map through that cast.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
应用推荐