关于二进制还是文本格式的争论已经结束。
这将使我们能够收集到关于二进制消息的时间开销信息以及消息开销信息。
This will allow us to gather timing information as well as information on message overhead for binary-based messages.
这是一个关于二进制编码的校验问题,通过校验之后,检验是否传输正确。
This is a binary encoded on the check, by check, to verify whether the correct transmission.
关于与其他选项的兼容性和与GCC 3.0以前的版本生成的二进制代码的调用兼容性,请参考GCC手册获得详细情况。
Refer to the GCC manual for details concerning the compatibility with other options and for call-compatibility with binary code generated by pre-3.0 versions of GCC.
本文评论了关于Linux onPOWER的二进制不兼容性的来源、为什么存在这些来源,以及开发人员如何将这些不兼容性对代码的影响降低到最小。
This paper reviews sources of binary incompatibility regarding Linux on POWER, why these sources exist, and how developers can minimize the impact these incompatibilities have on their code.
在使用这种技术时,会收集关于给定工作负载的数据(比如剖析),然后以优化此工作负载的方式使用这些数据重构应用程序二进制代码。
When using this technique, data is collected for a given workload, such as a profile that is then used to rebuild the application binary in such a way to optimize the workload.
要了解更多关于如何通过上传二进制内容创建文档的信息,请查看LotusQuickrwiki中的DocumentsServices主题。
For more details about how to create a document by uploading the binary content, see the Documents Services topic in the Lotus Quickr wiki.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
应用推荐