向其它用户或用户组授以执行资源访问控制程序(RACF)操作许可权。
The act of giving other users or groups authorities to perform RACF operations.
如果安全许可限定符是指定的,调用方的身份必须有指定角色来获得调用接口或操作许可。
If the security permission qualifier is specified, the identity of the caller must have the designated role in order to be permitted to call the interface or operation.
被许可方应全面自行负责使用许可工艺和设备以及操作许可方根据附件4提供的设备。
The Licensee shall bear the full and sole responsibility for using the Licensed Process and equipment and handling of the equipment supplied by the Licensor according to Appendix 4.
要整体定义操作的安全限制或界面,可是使用安全许可限定符。
To define security restrictions for operations or the interface as a whole, use the security permission qualifier.
如果没有指定安全许可,则没有许可检查,所有调用方都允许调用接口和操作。
If no security permission is specified, no permissions are checked and all callers are permitted to call the interface or operation.
然而,如果您将辅助节点用于SQL操作(读取或写入),则辅助节点必须获得完全的许可。
However, if you use any secondary node for SQL operations (read or write), the secondary node must be fully licensed.
然而,如果您将辅助节点用于SQL操作(读取或写入),则辅助节点必须获得完全的许可。
However, if you use the secondary node for SQL operations (read or write), the secondary node must be fully licensed.
如果您将辅助节点用于SQL操作(读取或写入),则辅助节点必须获得完全的许可。
If you use any secondary node for SQL operations (read or write), the secondary node must be fully licensed.
每个角色被赋予执行某些操作的许可。
The permission to perform certain operations are assigned to a role.
在另一方面,调用类可能需要临时许可权来完成另一个拥有那些许可权的类中的操作。
On the other hand, a calling class may need temporary permissions to complete an operation in another class that has those permissions.
用户能够直观地创建和操作安全性管理的另一个方面是方法许可。
Another aspect of Security Management that can now be visually created and manipulated is Method Permission.
即便如此,他们也屡遭UAC中断的狂轰烂炸,无论试行何种合法操作,都要取得许可方能继续。
Even then, they were bombarded by UAC interruptions, demanding permission to continue with whatever they were trying legitimately to do.
开发者需要操作更多的XML文件来提供功能,像定义安装文件夹以及显示许可信息等等。
Developers have to manipulate more XML to provide features, such as defining installation folder and displaying license information.
当调用内核函数sys_init _ module时,会开始一个许可检查,查明调用者是否有权执行这个操作(通过capable函数完成)。
When the kernel function sys_init_module is called, it begins with a permissions check to see whether the caller can actually perform this operation (through the capable function).
核心ACL类在基于与组和主体相关联的PermissionSets 的许可操作中的运行。
The operation of the core ACL class in permitting actions based on PermissionSets associated with groups and principals.
一旦用户授予了web应用程序代表其在Twitter中操作的许可,它们将被转发到各种各样的仪表板。
Once a user has granted my web application permission to act on his or her behalf in Twitter, they'll be forwarded to a dashboard of sorts.
赋予CodeSource许可权并不一定意味着允许所暗示的操作。
Assigning permissions to CodeSources does not necessarily mean the implied operations will be allowed.
一个可行理论是,IBM可能会收购Sun并把硬件出售给Sun的紧密合作伙伴富士通(译者:Sun的企业服务器是OEM富士通的),IBM然后将Solaris操作系统许可给富士通,由于IBM拥有代码。
One working theory is that IBM would potentially buy Sun and sell the hardware business to Fujitsu, a close partner of Sun. IBM could license Solaris, since it would own the code, to Fujitsu.
Windows:模仿Windows 2000操作系统(由于许可限制,PLAF只能在Windows平台下使用)。
Windows: Emulates the Windows 2000 operating system (because of licensing restrictions, this PLAF can only be used under a Windows platform).
请注意这并不要求每一次操作的许可。
要使操作成功完成,调用栈中的每个类必须有必需的许可权。
Each class in the calling stack must have the required permissions for the operations to complete successfully.
能够在操作系统的每个逻辑实例中提供足够的虚拟用户许可证,以提供与生产负载类似的负载。
Enough virtual user licenses to be able to place as close to a production load as possible to each logical instance of the operating system.
许可权允许对资源进行访问;它通过名称来定义,并且可能与某些操作关联在一起。
A permission permits access to a resource; it is defined by a name and may be associated with certain actions.
考虑到云的经济效益,人们总是倾向于那些性能良好、许可费更低的操作系统。
The relentless economics of the cloud will always push the choice towards an OS that has lower license fees and good performance.
同时,只有61%的苹果供应商遵循了在工作场所防止受伤的监管,仅仅57%有合格的操作环境许可证。
Meanwhile, only 61 per cent of Apple's suppliers were following regulations to prevent injuries in the workplace and a mere 57 per cent had the correct environmental permits to operate.
无论设置哪些操作为真都将运行(且假定许可)。
Whichever actions are set to true will be run (and consent assumed).
全面禁用包含用户从不想授权许可的操作是有可能的(例如,如果DBA总是需要从数据库获取SQL数据)。
It is possible to globally disable certain actions that the user will never want to grant consent to (for example, if the DBA always needs to gather the SQL data from the database).
客户自管理的服务器——只提供安装了操作系统的初级服务器,客户需要从此开始自行维护操作系统(包括操作系统许可证)并保障其安全性。
Client Managed Server - only initial OS installation provided, from that point forward the customer maintains and secure the OS including licensing of the OS.
客户自管理的服务器——只提供安装了操作系统的初级服务器,客户需要从此开始自行维护操作系统(包括操作系统许可证)并保障其安全性。
Client Managed Server - only initial OS installation provided, from that point forward the customer maintains and secure the OS including licensing of the OS.
应用推荐