提取通用行为并把它们包含在泛型DAO 中,让类的所有用户通过泛型 DAO访问这些功能,这样就可以减少代码重复。
You can reduce code duplication by abstracting the common behavior and including it in the generic DAO, where all users of the class will have access to the functionality.
这里不需要用户的干预。ODBC包装器自动认识到它正在访问一个CF数据源,并相应地改变它的行为。
No user intervention is required; the ODBC wrapper automatically recognizes that it is accessing a CF source and changes its behavior accordingly.
经验表明,当终端用户在过滤和排序他们拥有访问权的任务列表方面拥有极大自由度时,他们可能会形成一种择优挑选行为。
Experience has shown that when end-users have a great deal of freedom in filtering and sorting the list of tasks they have access to, they may develop a kind of cherry-picking behavior.
而更多的可盈利的分支在于分析用户如何访问这些数据并找到从用户行为中赚钱的方式。
But the far more lucrative portion of that world involves analyzing how users are accessing that data and finding ways to monetize those behaviors.
在之前的博文中,我们已经介绍了什么是RPM,它是怎么影响访问你的网站用户行为的。
In previous blog posts we've explained what RPM is and how it's influenced by what users do when they come to your site.
最后,当用户尝试访问EJB组件时,就会运行为特定数据库而部署的代码。
Finally, when someone attempts to access the Entity EJB components, the code deployed for the given database will then be run.
它可以对网站进行扫描,监测其是否有不正常的行为或是否存在已知的恶意行为,并阻挡用户访问这些站点。
These services scan for Web sites exhibiting unusual behavior or known malicious activity and block those sites from users.
试图阻止国外用户访问特定网站内容的行为日渐增多,而这些行为主要由企业及其法律顾问进行。
We are seeing more attempts, mostly by corporations and their lawyers, to keep foreign nationals off certain Web properties.
授权:访问系统不同功能的变化,并执行不同的任务,以及相关用户群体和交易行为。
Entitlements: Variations in access to different parts of a system and perform varying tasks. Related to user population and transaction behavior as well.
该门户的缺省行为是无论用户在何时访问 /portal下的资源,都将注销该用户。
The portal default behavior is to log the user out if he tries to access a resource under /portal at any point in time.
一旦访问了本网站的任何部分,用户即通过该行为表明全面接受本协议。
By accessing any part of this Site, the User indicates the User's acceptance of this Agreement in full.
行为技术跟踪用户的行为在网络上,包括网站的访问,访问时间,阅读内容,并搜索了。
Behavioral technology tracks a user's behavior on the Web, including sites visited, length of visits, content read, and searches made.
的一个组成部分,有针对性的营销是通过跟踪上网行为的用户访问该公司的网站上。
One component of targeted marketing is through tracking online behavior of customers that visit the company's website.
互联网使用信息的挖掘就是对互联网用户网络访问行为进行分析挖掘,以获得描述其中内存规律的模式。
Mining of Internet message is analyzing and mining network access action of Internet user so as to obtain mode for describing memory rule.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
服务器端可以控制用户数量和用户访问权限,并可对用户行为进行统计分析。
In side of server, the administrator can control the number of users and the access right, and can analyze what the user do.
介绍了模型中的一些关键技术,如模型工作原理、用户标识确定、访问资源分类、客户端浏览行为获取等。
Some key technology of this model is introduced, such as model's work principle and identify of user, classification of web page.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
如何使用Alexa的这样做是为了鼓励用户下载并安装Alexa工具条到您的浏览器,并用它来收集用户的浏览行为和数据的网站,你的访问。
How Alexa used to do this was to encourage users to download and install the Alexa toolbar onto your browser and using it to collect user browsing behaviors and data of sites that you visit.
如何使用Alexa的这样做是为了鼓励用户下载并安装Alexa工具条到您的浏览器,并用它来收集用户的浏览行为和数据的网站,你的访问。
How Alexa used to do this was to encourage users to download and install the Alexa toolbar onto your browser and using it to collect user browsing behaviors and data of sites that you visit.
应用推荐