客户机(用户和应用程序)。
用户和应用程序供应商看到最多的就是这一层。
This is the layer that is most visible to users and application providers.
只向每个用户和应用程序授予最低限度的访问权。
l控制器——这个对象允许用户和应用程序交互。
Controller - This object allows the user to interact with the application.
用户和应用程序如何使用无线承载网络?
移动日历使用户和应用程序能够安排和管理约会。
Mobile Calendar Enables users and applications to schedule and manage appointments.
使用支持SOA的单个功能集同时满足用户和应用程序访问功能。
Satisfy both user and application access capabilities with a singular set of SOA enabled capabilities.
SQL语言是用户和应用程序与关系数据库的标准接口。
SQL is the standar user and application program interface to a relational database.
只有具有所集成源中的恰当凭据的用户和应用程序才允许访问集成视图。
Only users and applications which have the appropriate credentials in the integrated sources are allowed to access the integrated view.
对于某些用户和应用程序,这些因素中的一个或另一个将比其它的更重要。
For some users and applications, one or another of these factors will be more important than others.
这种方法可以保护用户和应用程序不受某些数据库修改的影响。
Such an approach can protect users and application programs from certain database modifications.
通知(Notification)——可以在用户和应用程序之间交换消息。
Notification — Provides message interchange between users and applications.
基于Web的用户和应用程序服务器之间的交互遵循使用HTTP协议的原始web模型。
The interaction between Web-based users and the application server follows the original Web model using the HTTP protocol.
它使最终用户和应用程序可以获得对任何信息源的安全访问,不管它在什么地方。
It allows end users and applications to gain secure access to any information source, regardless of where it resides.
对用户和应用程序来说,系统WPAR看起来几乎和一个完整的AIX系统没有两样。
To users and applications, a system WPAR appears almost exactly like a full AIX system.
只有管理员或root用户,才具有管理权限,其他的用户和应用程序几乎都没有权限来访问内核或互相访问。
Only the administrator, or root user, has administrative privileges, and fewer users and applications have permission to access the kernel or each other.
计费管理:度量各个网络端点用户和应用程序对网络资源的使用情况,并以曰志方式记录到账务数据库中。
Accounting Management: measuring the use of resources of all applications for network users and network endpoints, record and log database.
控件可以提供或处理数据、接受用户输入、对事件作出响应或执行任意次连接用户和应用程序的其他功能。
A control can provide or process data, accept user input, respond to events, or perform any number of other functions that connect the user and the application.
其他组件包括一个作为联邦数据库的数据库,一个或多个数据源,以及访问数据库和数据源的一些客户端(用户和应用程序)。
Other components include a database that ACTS as the federated database, one or more data sources, and clients (users and applications) that access the database and data sources.
在以下情况下,DB2Information Integrator用户和应用程序可以访问会返回结果集的 SybaseASE存储过程
WebSphere Information Integrator users and applications can access a Sybase ASE stored procedure that has a result set if
该应用程序指示用户模仿15个不同的元音和16个辅音来重复接收到的发音。
The application instructs users to mimic 15 different vowel sounds and 16 consonant sounds to replicate received pronunciation.
与传统的自行车共享方式不同,无桩式自行车允许用户通过GPS和智能手机应用程序在街上取车或停放自行车。
Unlike traditional bike sharing method, dockless bikes allow users to simply pick up or park a bike on the street through GPS and smartphone app.
对于所有用户和所有应用程序,SSO使用相同的身份验证方法证实其身份。
SSO uses the same authentication method for all users and all applications to prove their identity.
该组件的用户界面和应用程序逻辑必须能灵活地适应可能要管理的各种项。
The user interface and application logic of this component must be flexibly adaptable to the different items that may be managed.
随着移动商业从时髦的口号逐渐变成现实,对于移动用户和无线应用程序开发人员这类人而言,事务安全性正在成为一个重要方面。
As mobile commerce becomes less of a buzzword and more of a reality, transaction security is becoming an important concern for mobile users and wireless application developers alike.
WorkplaceServicesExpress可以帮助连接几乎可以从任何地方访问的一个位置中的用户、数据和应用程序。
Workplace Services Express helps you connect your users, data, and applications in one location that can be accessed from almost anywhere.
该工具的测试重点在于Web服务和用户应用程序之间的交互。
The tool's focus is on the interaction between a Web service and user applications.
session是特定用户和Web应用程序之间的一系列请求-响应交换。
A session is a series of request-response exchanges between a specific user and a Web application.
处理用户错误和应用程序异常。
重要的是要理解当前安全模型、用户角色、权限和应用程序功能。
It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.
应用推荐