人们的客户请求技术收持。
玩家联系客户服务人员时会提出各种各样的问题,包括请求技术支持、支付和帐号管理问题以及请求游戏内帮助。
These contacts range from technical support requests, billing and account management issues, e-mails, and in-game help requests.
例如,如果服务请求不需要提供身份验证或授权,实现技术的选择就可以非常的广泛。
For example, if no authentication or authorization of service requests is required, the choice of technology can be very broad.
如果您打算为每个请求或者事务发起不同的TCP连接,那么上述的技术很明显会失效。
The above technique would obviously fail if you were to start a different TCP connection for every request or transaction.
以下是一些技术HTTP的请求的数目减少同时仍然支持丰富的页面设计。
Here are some techniques for reducing the number of HTTP requests, while still supporting rich page designs.
集成开发人员使用ESB的相关工具和技术构建逻辑,以控制请求在这些服务间路由的方式。
An integration developer USES ESB-related tools and technology to build the logic that controls how requests are routed between these services.
事件排序是一个需要处理多重异步请求的技术。
Event sequencing is a technology that requires processing multiple asynchronous requests.
考虑:不同技术对请求的异步执行是否支持?
Consideration: Does the technology support asynchronous execution of requests?
一种可以减轻调试痛苦的技术是记录服务请求。
A technique to mitigate debugging pains is to log service requests.
根据所用技术的不同,可以以不同方式为请求范围生成事件。
Depending on the technologies used, you can generate events for request scope in different ways.
在这种情况下,区域设置编码在URL标记中,您可以使用本文描述的技术确定区域设置,并对请求使用此区域设置。
In this case, the locale is encoded in the URL tokens, and you can use the technique described in this article to determine the locale and use it for the request.
应伊拉克卫生部的请求,世卫组织正提供技术支持,尤其是在实验室检测领域提供技术支持。
In response to a request from the Ministry of Health, WHO is providing technical support, particularly in the area of laboratory testing.
对于请求当前用户授权这一典型情况,您将使用隐式主题技术。
You would use the implicit subject technique for the typical case of requesting authorization for the current user.
拉技术是在手持设备使用其网关发出通信以请求数据时。
Pull technology is when the handheld device initiates the communication using its gateway to request data.
这就意味着,服务请求者不知道提供者实现的技术细节,比如程序设计语言、部署平台,等等。
This means that the service requester has no knowledge of the technical details of the provider's implementation, such as the programming language, deployment platform, and so forth.
该技术可以大大提高性能,因为它减少了I/O请求的数量。
This technique can significantly improve performance because it cuts down on the number of I/O requests.
在将来自提供者的响应最终发送回原始请求者之前对响应应用相同技术的方式。
How the same techniques are applied to the response from the provider before it is finally sent back to the originating requestor.
后一种技术要求专门的服务来接收XML请求和维护页面的不同版本,虽然用几行PHP代码就能编写这样的服务器扩展。
The latter technique requires a specialized server to receive your XML requests and maintain different versions of pages, though you can easily write such a server extension in a few lines of PHP.
如果在SCA组件之间异步地处理请求时发生技术故障,就会产生失败的事件。
Failed events are generated if technical failures occur while processing requests between SCA components asynchronously.
根据实施应用程序所用技术的不同,生成HTTP请求的方法也不同。
Depending on the technology used to implement the application, the method of generating the HTTP requests may vary.
长轮询是一种轮询技术,其中服务器延迟完成HTTP请求,直至已经为客户机准备好了一个更新信息或发生超时。
Long polling is a polling technique in which the server will delay completing the HTTP response until either an update is ready for the client or a timeout occurs.
重定向这种技术告诉浏览器和爬行器请求的URL已经改变了。
A redirect is a technique that tells a browser and a spider that the requested URL has changed.
他们在一线评估技术更改请求,并确定如何对设计进行调整,以最好地处理此类请求。
They are the front line in assessing technical change requests, and they determine how the design can best be adapted to accommodate such requests.
确定人们理解业务用例中的词,例如联系、请求,不要为基本的技术交流基础设施暗示技术约束。
Be sure people understand that, in business use cases, words such as contacts, requests, or pushes do not imply technical constraints for the underlying technical communication infrastructure.
假设对两个map的请求是平均分布的,那么这种技术在这种情况下将把可能的争用数目减半。
Assuming that requests against the two maps are evenly distributed, in this case this technique would cut the number of potential contentions in half.
您可以在生产环境中使用此项技术来区分模拟JMeter请求与实际用户。
You can use this technique in a production environment to distinguish artificial JMeter requests from real users.
通过使用write -behind技术,这些产品还提供更新请求的可伸缩服务。
They can also provide scalable servicing of update requests by leveraging their write-behind technology.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
应用推荐