随着数据库快速不断地增长,通过访问所有数据收集统计信息的能力可能会受到固定的批量窗口、内存和CPU约束的阻碍。
With databases growing at an unrelenting pace, the ability to collect statistics by accessing all of the data may be hampered by fixed batch Windows or memory and CPU constraints.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
它向您提供使用定义的安全约束保护资源的能力,然后定义可以访问受保护资源的用户角色。
It gives you the ability to protect a resource with a defined security constraint and then define the user roles that can access the protected resource.
在数据库中定义约束使DB 2可以知道表之间的关系,并且在某些情况下允许DB 2根据这样的知识选择更好的访问计划。
Having the constraints defined in the database allows DB2 to know relationships between tables and in some cases allows it to select better access plans based on that knowledge.
客户机运行时有时需要某些对访问服务本身的要求或约束(包括身份验证、完整性和机密性要求)。
Sometimes certain requirements or constraints on the access to the service itself — including authentication, integrity, and confidentiality requirements — are needed by a client run time.
图7:可以将RAM的访问控制配置为,允许同一个用户在多个社区中扮演拥有各不相同的权限和约束的多个角色。
Figure 7: Access control for RAM can be configured to allow the same user to have multiple roles across multiple communities with varying permissions and constraints.
不同信息源的读写访问(特别在对逻辑工作单元进行协调时)将受到供应商特定的支持的约束。
Read-write access to different information sources - in particular when coordinating a logical unit of work - is constrained by the vendor-specific support.
如果准备向外部用户公开服务,您需要某种安全约束来保证只有授权的用户才能访问服务。
If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.
无处不在的BAM的基本思想是在需要一出现时就利用信息的“及时性”,而无单一访问机制的约束。
The idea of BAM everywhere is to take advantage of the "timeliness" of information as soon as the need arises without the constraint of a single access mechanism.
正如下面约束与限制部分中所述,消息流必须仅访问JDBCxa数据源和mq队列,而不是其他OD BC数据源或资源管理器。
As noted in the Restrictions and Limitations section below, the message flow must access only the JDBC XA data source and MQ queues, and not other ODBC data sources or resource managers.
本文描述如何约束用户访问这些可以更新或者获取数据库数据的操作。
This article describes how you restrict users access to these database operations that could update or retrieve data from the database.
克林顿发表了她最近已宣布的一次访问,这是美国国务卿在50年内的第一次,并不代表美国终止对缅甸的约束。
Clinton has said her recently announced visit, the first for an American secretary of state in 50 years, does not mean the end of US sanctions on Burma.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
设备驱动处于内核之上,运行在用户态。每个驱动都作为单独的进程运行,受到内存管理硬件的严格约束,只能访问自己拥有的内存。
Above the kernel, running in user mode, are the device drivers, each one running as a separate process tightly restricted by the memory management hardware to accessing only its own memory.
标准J2EE安全模型包含角色的描述,包括可由主体访问的受安全机制约束的资源。
The standard J2EE security model contains a description of roles, which encompasses the security-constrained resources that can be accessed by principals.
SQL编译器使用信息约束将语句转化成更优的形式,从而改善对所需数据的访问路径。
The SQL compiler USES them to transform a statement into a more optimized form, thus improving the access path to the required data.
对文件夹的访问可能按IP地址约束为某个特定文件夹,也可配置用户名和密码。
Access to a folder can be restricted by IP address to a certain folder, or a username and password can be configured.
然后资源内核可以合并这些请求,使用任务定义的约束定义一个调度,从而提供确定的访问(如果无法提供确定性则返回错误)。
The resource kernel can then merge the requests to define a schedule to provide guaranteed access using the task-defined constraints (or return an error if they cannot be guaranteed).
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
目前这种方法所具有的唯一好处是在生成代码中支持基于XPath的约束和访问方法。
The only advantage provided at present is support for XPath-based constraints and access methods in the generated code.
在单个应用程序中组合这两种类型的接口来支持两种访问Bean的方式有助于减少设计约束。
Combining both types of interfaces within a single application, supporting both ways of access to the bean, may help relax design constraints.
定位并修复数据库在约束、触发器、区(extent)和索引上的问题,同时可以让Toad直接利用OracleOCI调用获得对OracleAPI的完全访问。
Find and fix database problems with constraints, triggers, extents, indexes, and grants Toad utilizes direct Oracle OCI calls for full access to the Oracle API.
如果应用程序包含安全的(具有授权约束的)和不安全的Servlet的混合体,则不安全的Servlet将无法访问会话对象。
If the application contains a mixture of secure (those with authorization constraints) and insecure servlets, the insecure servlets cannot access the session object.
xml文件列出应用程序中存在的约束和安全角色以及允许访问某个目录的角色。
The web.xml file lists constraints and security roles that exist in your application as well as the roles that are allowed access to a certain directory.
前者简单并且相对容易,但是如果从各地进行访问,仍有网络方面的潜在约束。
The former is simple and relatively easy, but there is still a potential constraint of network latency, especially if accessed across the globe.
事实上,为了避免访问这些固有的特性,您在编码中必须严格约束(只是使用EL、标签库和类似的特性)。
In fact, to avoid access to these native features, you will have to exercise great discipline in coding (using only EL, tag libraries, and the like).
auth-constraint元素用于指定对通过认证的用户帐户的约束,这些约束必须在访问受保护页面之前得到满足。
The auth-constraint element is used to specify constraints for an authenticated user account that must be met prior to accessing protected pages.
hypervisor提供了对PS 3硬件的受约束和经过过滤的访问。
The hypervisor provides controlled and filtered access to the PS3's hardware.
应用推荐