生产环境最好指向承载应用程序的位置。
The production environment ideally points to where your application is being hosted.
在文件的开头包含触发器处理程序的位置。
Include the location of your trigger handler at the beginning of the file.
按照图13中所示的步骤来定义驱动程序的位置。
Follow the steps as shown in Figure 13 to define the location of the driver.
源数据库和DB 2JDBC驱动程序的位置。
按照图21中所示的步骤来定义该驱动程序的位置。
Follow the steps as shown in Figure 21 to define the location of the driver.
Linux将缓存动态链接的程序的位置信息,以提高性能。
Linux caches library location information for dynamically linked programs to improve performance.
查明源数据库和DB2的JDBC驱动程序的位置。
Table 1. Location of JDBC drivers for your source database and db2.
主题应用程序和通用资源应用程序的位置都列在下面。
The location of both the theme application and common resources application is listed below.
请从最初运行安装程序的位置上再次运行安装程序。
这些信息指示DLL项目查找调用应用程序的位置。
This information indicates where the DLL project can find the calling application.
DEMO_HOME:引用您解压缩演示应用程序的位置。
DEMO_HOME: refers to the location where you unzip the demonstration application.
它允许应用程序相互通信,而无需知道接收应用程序的位置。
This lets applications communicate with each other without knowing the location of the receiving applications.
请确认安装程序的位置,并按照屏幕提示执行后面的安装过程。
Confirm the location of the installer, and follow the screens for the installation process.
我想在我的应用程序的位置和当前日期为文件名创建一个日志文件。
I want to create a log file in my app location and current date as file name.
UNIX中的bin目录是存储二进制和其它可运行程序的位置。
The bin directory in UNIX is where binaries and other runnable programs are stored.
拖动标签按钮可以重排小程序的位置,再次点击把手图标来锁定位置。
Drag the labeled buttons to re-order the applets you have, and click the wrench again to fix your selections.
安装程序已经损坏。请从最初运行安装程序的位置上再次运行安装程序。
The Setup program has become corrupted. Run Setup again from where you originally ran it.
我们可以控制输入进入应用程序的位置,但是我们不能控制输入此数据的用户的意图。
We can control where the data comes into our applications, but we cannot control the intent of the user who inputs this data.
例如,如果更改某个应用程序的位置,您可以更新注册中心,请求将会自动重新路由。
For example, if you change the location of an application, you can update the registry, and requests can be automatically rerouted.
存放这个程序的位置对于个别的系统管理员来说也是件麻烦事。下面给出一些建议。
The location of the client program is a matter for individual system administrator s. the following are thus suggestions only.
说明安装引导加载程序的位置,例如主引导记录(MBR),然后完成定制过程,并单击OK按钮。
Indicate where you want to install the boot loader, such as Master boot Record (MBR), finish your customization, and click OK.
可以把它下载到您机器上的任何地方,在第一次连接oracle数据库时,可以指定驱动程序的位置。
You can download it to anywhere on your machine, and then when you are connecting to the Oracle database for the first time, you can specify the driver location.
如果你想使用launchy,你得编辑launchy .xml文件,告诉它你要使用的应用程序的位置。
If you want to use launchy, you have to edit the launchy.xml file and tell it where to find the applications you want to use.
Kerberos配置文件和 Kerberos实用程序的位置取决于 Kerberos 的安装位置。
The location of the Kerberos configuration files and Kerberos utility is dependent on the Kerberos installation location.
在ProcessDesigner窗口中创建步骤处理程序,并将页面ID粘贴到步骤处理程序的位置,如图10所示。
Create a step processor in the process Designer window and paste the page ID into the step processor location, as shown in Figure 10.
选择File >OpenProject并指定下载部分提供的Trading.xml应用程序的位置。
Select File > Open Project and specify the location of the Trading.xml application provided in the Downloads section.
事实上还有其他方法,包括随机化可执行程序的位置;Crispen的“PointGuard”将这种探测仪思想引申到了堆中,等等。
In fact, there are other approaches as well, including randomizing the locations of executables; Crispen's "PointGuard" extends the canary idea to the heap, and so on.
在创建项目时,Visual Studio . NET检索适当的Office应用程序的位置,并存储该位置以及必要的命令行参数。
When you create your project, Visual Studio.net retrieves the location of the appropriate Office application and stores that location along with necessary command-line parameters.
环境变量,如PATH(它用于控制搜索程序的位置)和TZ(它用于指定您的时区),可以保存您的首选设置,并作用于您所启动的所有的进程。
Environment variables, such as PATH (which controls where to search for programs) and TZ (which specifies your time zone), persist your preferences and affect all the processes you launch.
攻击者可以通过设置PATH环境变量来改变saposcol寻找其他程序的位置,然后为saposcol创建一个恶意的“扩展”程序来运行。
An attacker could set the PATH environment variable to change where saposcol looked for other programs, and then create a malicious "expand" program for saposcol to run.
应用推荐