Figure 3 shows some client access configurations.
图3显示了一些客户机访问配置。
Examples of frameworks include location and management of data source drivers, and configurations for access to particular data source instances.
框架的示例包括定位及管理数据源驱动程序,以及访问特殊数据源实例的配置。
VNC servers typically provide for such useful configurations as read-only access.
VNC服务器通常为只读访问提供了非常有用的配置。
You can also leverage the command line interfaces to change the access control configurations of script packages, and even delete a package from the appliance using its ID, as shown in Figure 10.
您还可以利用命令行界面来更改脚本包的访问控制配置,甚至使用脚本包的ID从此设备删除一个脚本包,如图10所示。
It also updates the network configurations to access the WPAR from outside.
还会将网络配置更新为从外部访问WPAR。
Local configurations are not visible to people without access to the run-time environment or who do not have detailed knowledge of how the policy is stored and managed on a particular host.
在无权使用运行时环境或不了解特定主机上是如何存储及管理策略时,本地配置是不可见的。
Access the numerous configurations available via preferences.
通过Preferences访问许多可用配置。
If the WebSphere MQ administration team USES a desktop client to access the queue managers, the configurations proposed here will break that access.
如果WebSphereMQ管理团队使用桌面客户端访问队列管理器,此处所建议的配置将阻止此访问。
This leads to design decisions that require access to Web server configurations (for example, to create Apache ProxyPass rules) or creation of special server scripts.
因此设计的时候必须确定访问Web服务器配置(比如创建ApacheProxyPass规则)还是创建专门的服务器脚本。
Alternatives are a major feature of the WS-Policy design, allowing services to let clients choose which of two or more acceptable configurations are to be used when they access the service.
替代选择是WS - Policy设计的一个主要特点,使客户机在访问服务时可以从两个或多个可行配置中选择要使用的配置。
Iiop introduces new configuration considerations on the Lotus Domino server: security, access to the file diiop_ior.txt on the Lotus Domino server, and various port configurations.
iiop在服务器上引入了新配置考虑:安全性、访问LotusDomino服务器上的diiop _ ior . txt文件,以及各种端口配置。
Are there proprietary configurations that the partner has implemented (such as specific security information that needs to be provided in Simple Object Access Protocol (SOAP) or HTTP headers)?
是否存在合作伙伴已经实现了的私有配置(比如需要在SimpleObjectAccessProtocol (SOAP)或者http头中提供特定的安全信息)?
Feature teams should have access to the regression tests of the platform components so that they can build locally against different configurations before they commit their changes.
特性团队应该有权对平台组件进行回归测试,这样他们就可以在提交更改前在本地针就不同的配置环境生成产品。
Any user that connects to the repository has access to the connection groups and to the connection configurations for creating database connections.
连接存储库的任何用户都能够通过访问连接组和连接配置创建数据库连接。
Disk access rates and configurations affect the speed of database and view opening and of opening and navigating a collection (view index).
磁盘访问率和配置影响数据库、视图打开和集合导航(查看索引)的速度。
And some proxy server configurations have made it difficult for other users to access the site.
还有一些代理服务器的配置,目前已经难以为其他用户访问该网站。
The two different configurations are horizontal axis and vertical access wind machines.
两种不同的结构是水平轴和垂直轴。
If you expect more than one user to access the data, and you want each retrieval to the data to be verified by the security configurations for the database, do not use caching.
如果希望数据可由多个用户访问,并且要求数据库的安全配置验证每个对数据的检索,请不要使用缓存。
If you expect more than one user to access the data, and you want each retrieval to the data to be verified by the security configurations for the database, do not use caching.
如果希望数据可由多个用户访问,并且要求数据库的安全配置验证每个对数据的检索,请不要使用缓存。
应用推荐