When you delete the virtual machine, the ephemeral storage is deleted and thus the data stored on that storage will be deleted.
当您删除虚拟机时,临时性存储会被删除,因此该存储中保存的数据也将随之被删除。
Thus, the tooling of application modeling and data modeling should support model update capability.
因此,应用程序建模和数据建模工具应该支持模型更新功能。
Publishing product data to a global repository, thus enabling consumers to access and use the information.
向全球存储库发布产品数据,从而使得使用者能够访问并利用这些信息。
The execution of the decision service thus needs to be interrupted, the necessary data fetched by the application, and the decision service invoked again, starting where it left off.
因此决策的执行必须被中断,应用程序获取的必需数据和再次调用的决策服务继续从中断处开始。
The presentation logic, business logic and data access logic were all clubbed together thus leading to fragile design which is hard to change without breaking.
表现逻辑、业务逻辑和数据访问逻辑掺杂在一起导致脆弱的设计,这样很难在不破坏原 有设计的基础上做出变动。
Thus, the relevant information can be obtained only by in-depth analysis of massive amounts of data and existing artifacts.
因此,相关的信息只能通过深入分析海量数据和已存在的工件来获得。
Thus, the read operations compete with log writing and the write operation for data pages from the buffer pool.
因而,读操作与日志写和缓冲池中的数据页的写操作之间存在竞争。
Thus, whole columns of data and the associated indices are not stored in the database.
因此,整个数据列和相关的索引不是存储在数据库中。
You can delete your virtual machine and the persistent storage will not be deleted, thus you can reattach the storage to a new virtual machine and access your data again.
删除虚拟机的同时并不会删除持久性存储,因此您可以将持久性存储重新附加给新的虚拟机并在此访问您的数据。
In this way, you can greatly improve performance and still prevent transmission of user IDs and passwords in clear text, thus preventing unauthorized access to the data.
通过这种方式可以极大地提高性能,并且可以防止用明文传输用户ID和密码,进而防止未授权的用户访问数据。
In cloud computing, VMM allows users to monitor and thus manage aspects of the process such as data access, data storage, encryption, addressing, topology, and workload movement.
在云计算中,VMM允许监视用户,因此可以管理数据访问、数据存储、加密、寻址、拓扑和工作负载转移等方面。
Thus, the system releases the working storage pages for the data of a process and stack when the process exits.
因此,当进程退出时,系统将释放进程数据和堆栈的工作存储分页。
These underlying data access calls are thus consolidated in the data access layer and hidden from the business logic.
这些底层数据调用整合到数据访问层中,对于业务逻辑是不可见的。
The ability to serialize, and thus transport, all three elements — the metadata, the data, and the change summary.
序列化及传输所有三个元素——元数据、数据和更改摘要——的功能。
IDL is responsible for ensuring that data is properly exchanged between dissimilar languages and is, thus, responsible for the language independence of CORBA.
IDL负责确保在不同的语言之间正确地交换数据,从而负责CORBA的语言独立性。
The resulting query plans are based on data, rather than heuristics, and are thus extremely efficient.
生成的查询计划基于数据,而不是推断,因此非常高效。
This memory expansion factor provides input to the operating system on the effective memory capacity the user is trying to achieve, and thus, the amount of data the OS should try to fit into memory.
这个内存扩展因数为操作系统提供了有关用户尝试实现的有效内存容量的输入,即OS应尝试纳入内存的数据量。
By increasing the data transfer chuck size (from 1000 bytes to 32k), and thus reducing the context switching, performance was greatly improved.
通过增加数据转移快的大小(从1000字节到32k),因此降低了内容切换频率,因而系统的性能得到了很大的提高。
All the administration, management, and monitoring data is exposed as RESTful Web services and thus can be seamlessly integrated in the toolkit of your choice.
所有的管理与监控数据都通过RESTfulWebservice公开出来,这样就能与你所使用的工具无缝集成了。
You can thus represent all Lotus Domino data using JSON and greatly enhance the usability of an existing application.
因此,您可以使用JSON表示所有的LotusDomino数据并极大地增强已有应用程序的可用性。
This helps secure backed-up data during transmission, and it means that the data stored on the Tivoli Storage Manager server is encrypted and thus is unreadable by any malicious administrators.
这有助于在传输过程中保护备份数据,它意味着存储在TivoliStorageManager服务器上的数据已加密,因而不能被恶意管理员所读取。
Multiple file servers can be mapped to the same name, thus providing redundancy and locality of data access.
可以把多个文件服务器映射到同一个名称,从而为数据访问提供冗余和位置。
Data can be entered directly by the tester, thus extending the component test, or the tester can send comments on data selection to the developer and the developer can enter the data.
数据可以由测试人员直接输入,这样,扩展了组件测试,或者测试人员可以就数据选择提出一些建议,由开发人员输入数据。
Thus, aggregation is handy but difficult to achieve, since it requires crawling through all the available data sources and scaling the search engine.
因此,聚合的方式非常方便,但是却难以实现,因为它需要通过爬网的方式处理所有可用的数据来源,并且扩展搜索引擎。
The problem can get worse if the session contains more and more data and thus requires more memory.
如果会话包含越来越多的数据,从而要求使用更多的内存,则会进一步使问题严重化。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
The Preferred Data Source pattern is considered an Enterprise Application Integration (EAI) pattern in an SOA context; thus the strengths and weaknesses of typical EAI patterns apply here.
在SOA环境中,可以将首选数据源模式作为企业应用程序集成(EAI)模式,因而典型EAI模式的优缺点也适用于此处。
Heat generated by a data centre could also be used to more efficiently process the animal waste and thus increase methane production.
由数据中心所产生的热量也可以被用来更为高效地处理动物粪便,从而提高沼气的产量。
Thus, the application message data is prefixed with MQXQH and MQDH structures.
因此,应用程序消息数据以MQXQH和MQDH结构为前缀。
Sparse caches are normally accessed using keys since not all of the data is available in the cache and thus queries cannot be done using the cache.
它通常使用关键字进行访问,因为缓存中并非所有的数据都能够使用,使用缓存进行查询可能无法执行。
应用推荐