配置检测脚本将创建数据存储位置并分配正确的所有权。
The configuration detection scripts will create the data storage locations and assign the correct ownerships.
它还会检测您是否配置了网络支持,并会向您提示配置参数。
It will detect that you have configured networking support and will prompt you for configuration parameters.
当然也有例外,象出现在问题领域的配置问题,如货币表示符号,当然它也可以通过检测当前语言环境来自动完成。
Exceptions, of course, being configuration issues that appear in the problem domain, such as currency representation, though even that could be done automatically by detecting the current locale.
所有其他参数都可以被配置为检测间隔更长的音调事件——在一个时间阈值内发生多个并行音调事件,或者音调事件之间的时间间隔不同。
All of the other parameters can be configured to detect more widely spaced tonal events — multiple simultaneous tonal events across a time threshold, or different timings between the tonal events.
假设设备依照其特定指令设置,子系统将反映在系统引导时检测到的配置。
Assuming that the devices are set up according to their specific instructions, the subsystem will reflect the configuration detected at system boot.
CM仲裁程序将检测 CM配置文件中定义的所有SLA 是否已关闭。
The CM arbitrator will detect that all SLA defined in the CM configuration file is down.
使用HATS的屏幕定制功能,您可以配置HATS在检测到应用程序的第一个屏幕时运行宏。
Use the screen customization feature of HATS, where you can configure HATS to run the macro when the first screen of the application is detected.
这个政策区域检测到网络拓扑并定义所有主机和它们的配置详细信息,以及包含软件包的部署文档。
This policy region captures the network topology and defines all the hosts and their configuration details along with deployment profiles that contain the software packages.
系统可以在进行系统故障检测时同步用户、组、软件包等配置。
Systems can synchronize users, groups, packages, and other things with system failure detection.
内核将首先载入内核模块,然后检测硬件(软驱、硬盘、网络适配器等),检验硬件配置,然后扫描和载入设备驱动程序。
The kernel will load kernel modules first, then detect hardware (floppy drive, hard disk, network adapters, etc.), verify hardware configuration, and then scan and load device drivers.
可以完全配置轻量级内存泄漏检测,并将其设计为与高级自主管理器或自定义JMX客户机交互。
Lightweight memory leak detection is completely configurable and is designed to interact with advanced autonomic managers or custom JMX clients.
如果已有默认配置,并在系统中刚加入新内核,只要在GRUB2配置文件中检测并添加新内核就行了。
If you've got a default configuration but you've just added a new kernel to your system, this might be enough to detect the new kernel and add it to your GRUB 2 configuration file.
但是没有应用程序需要知道令牌名称因为配置进程为适当的令牌检测和配置子系统。
So; however, no applications need to be aware of the name since the configuration process detects and configures the subsystem for the proper tokens.
通过使用智能统计特性,您可以对服务器进行配置,从而在运行updatestatistics命令时自动检测并刷新已过时的统计数据。
With the smarter statistics feature, you can now configure the server to automatically detect and refresh only stale statistics when you run the update statistics command.
在本文中,我将越过基本的安装和配置知识,讨论如何设置Snort,以检测与Web相关的入侵。
In this article, I'll go well beyond installation and configuration, and talk about how to set up Snort to detect Web-related intrusions.
Notes客户机将检测到邀请的会议室/资源/地点不在配置的首选组中,并提示更改/更新当前列表。
The Notes client will detect that an invited room/resource/site is not in the configured preferred set, and prompt you to change/update your current list.
WebSphereExtendedDeployment提供了许多配置内存泄漏检测的策略。
WebSphere Extended Deployment provides a number of policies that configure memory leak detection.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
它会提取文件、检测你的Firefox配置,并指出将会添加到静默安装包中的文件。
It will extract the files, detect your Firefox profiles and show you the files that it will add to the silent installation package.
相反,这里的焦点是如何检测和解决因并行更新WebSphereApplicationServer配置而产生的WebSphere Application Server配置冲突。
Rather, the focus here is how to detect and resolve WebSphere Application Server configuration conflicts that can arise from parallel updates of the WebSphere Application Server configuration.
在创建这个项目时,服务器工具将自动地检测到新的应用程序客户机项目已被添加到EAR项目并提示您修复服务器配置。
When creating the project, the server tools will automatically detect that the new application client project has been added to the EAR project and will prompt for repairing the server configuration.
但安装配置向导并不会检测到您的工作流程以及记录缺陷的需要。
The setup wizard does not detect your workflow and requirements for logging defects.
下面的性能检测没有采用协助代理,只检测配置1。
The performance explorations that follow did not use this assistance agent, exploring only Configuration 1.
RAD的配置和日志透视包含一些视图,用来分析你的应用程序的内存使用,和通过比较两个堆转储的高级算法来检测这些泄漏。
RAD's profiling and logging perspective includes views for analyzing your application's memory usage and detecting these leaks through advanced algorithms that compare two heap dumps.
类支持代理配置脚本的自动检测和执行。
Class supports automatic detection and execution of proxy configuration scripts.
OmnifindEnterpriseEdition 8.4附带一个强大的文本分析模块,可以通过配置这个模块在处理的文档中检测许多概念。
Omnifind Enterprise Edition 8.4 ships with a powerful text analysis module that can be configured to detect a wide variety of concepts in processed documents.
PowerHASystemMirror可以配置为,当在生产节点上检测到故障时自动转移到备份节点,以尽可能不需要系统操作员的干预。
PowerHA SystemMirror can be configured to fail over automatically to a backup node when a failure is detected on the production node, minimizing the need for system operator intervention.
如果Kudzu程序检测到一块网卡,这就意味着在前面过程中没有正确配置这块网卡。
If the Kudzu program detects an Ethernet card, then this an indication that the card was not properly configured the first time around.
Linux内核使用这些信息在引导时自动检测并启动RAID阵列,因此您应确保对您创建的每个 RAID卷进行了这种配置。
The Linux kernel uses this information to auto-detect and start up RAID arrays at boot time, so you should make sure that every RAID volume you create is configured to do this.
首先,RedHatLinux 8.0不需要任何特殊配置或额外的驱动程序就能立刻检测到我们的RAID控制器;而7.3不行。
First, Red Hat Linux 8.0 detected our RAID controller out of the box without any need for special configuration or additional drivers; 7.3 did not.
应用推荐