Configuring the application for large pages.
应用程序的大页面配置。
Within the root element, all parameters are described for configuring the application.
在根元素中是配置应用程序所需的所有参数。
The amount of custom development required is greatly reduced by using a packaged application, and the primary focus is on configuring the application.
通过使用打包应用软件,定制开发需求的总量大大减少,而更多的焦点集中到配置这个应用软件上。
This is normally what we want, and is ideal for configuring application classes that the framework does not know about.
这通常就是我们想要的,并且对于配置那些框架并不了解的应用程序类,也是理想的。
By configuring and running the sample application, you saw how straightforward it can be to begin using JPA for new development projects today.
通过配置和运行该示例应用程序,您看到了现在使用JPA 来进行新的开发项目是多么简单。
This will save time when configuring the JDBC driver and DataSource needed by the application server.
这将在配置应用程序服务器所需的JDBC驱动程序和数据源时节省时间。
When initially configuring policies, one might intuitively define a single service policy for a given application, based on the importance of that application.
在最初配置策略时,用户可能根据直觉按应用程序的重要性只为给定的应用程序定义一个服务策略。
The rest of this article describes how to start configuring the search application.
本文其余部分介绍了如何开始配置搜索应用程序。
For instance, supposing that the component USES a RDBMS data source configured in the application server, testing the component might involve configuring it for a local RDBMS or any other file system.
例如,支持组件使用配置在这个应用软件服务器中的RDBMS数据源,测试这个组件可能包括为一个本地rdbms或者任何其它文件系统对它进行配置。
In an EJB-based solution, the EJB deployer must tell the application server how transaction demarcation will be handled by configuring EJB deployment descriptor Settings.
在基于EJB的解决方案中,EJB部署人员必须通过配置EJB部署描述符设置,告诉应用程序服务器如何处理事务界定。
The same issue is observed when configuring a data source in Application Server.
在ApplicationServer中配置数据源时也可能发现同样的问题。
The following subsections provide instructions for configuring file-based security on WebSphere Application Server Version 6.1.
以后小节提供了在WebSphereApplicationServer版本 6.1上配置基于文件安全的指导。
Configuring properties within the application.
在应用程序中配置属性。
Configuring an application to use the jla.
配置应用程序以使用jla。
Configuring the modules within the application, for example, resolving module dependencies.
在应用程序中配置模块,例如分解模块依赖性。
Stepping back from the code a minute, here is a summary of what you have seen by exploring and configuring the sample application.
对于代码的研究先告一段落,这里总结一下您通过探索和配置示例应用程序所看到的东西。
Configuring the resources for the application client project.
为这个应用软件客户端项目配置资源。
The steps for configuring this are described in the WebSphere Application Server Information Center.
配置步骤在WebSphereApplicationServer信息中心有介绍。
Configure load balancing: This activity involves installing the WebSphere Application Server Network Deployment version 7.0 and configuring the load balancing capability for the environment.
配置负荷平衡:该活动涉及到了安装WebSphere程序服务器网络部署7.0版本,以及为环境配置负荷平衡功能。
After installing and configuring WebSphere Application Server to use a custom user registry, you can restore the previous security configuration.
在安装和配置WebSphereApplicationServer使用自定制用户注册表之后,您可以恢复之前的安全性配置。
We also provide a brief outline on how to set up a JMS queue in WebSphere application Server and highlight the key points of configuring applications that send and receive JMS messages.
我们还简要介绍了如何在WebSphereApplicationServer中建立jms队列,以及在配置收发jms消息的应用程序时的一些关键点。
This section contains instructions for installing and configuring the software required to develop, deploy, and run the example application.
此部分包含安装和配置开发、部署和运行示例应用程序所必需的软件的说明。
Following are instructions for installing and configuring the software required to develop, deploy, and run the example application.
以下是安装和配置开发、部署和运行示例应用程序所需的软件的指导信息。
The existing process for installing, updating, and configuring an application server installation is time consuming and repetitive.
现有的安装、更新和配置应用服务器安装的过程非常耗时,而且有很多步骤是重复的。
This will load the main page for configuring application security.
此操作将加载用于配置应用程序安全性的主页。
We will be configuring the client application to use this queue name.
我们将确认客户机应用程序使用此队列名称。
If you use the controller solely to monitor the embedded application server (the typical case), configuring the controller to accept requests only from "this computer" is the best approach.
如果使用此控制器只是为了监视嵌入式应用服务器(通常情况),请将此控制器配置为仅接受来自“这台计算机”的请求是最好的方法。
In the first scenario (the second is scenario 6), identity mapping is performed from the application code, without using and configuring custom login modules.
在第一个场景(第二个是场景6)中,由应用程序代码执行标识映射,而不使用和配置自定义登录模块。
That is where you do all of the typical Guice configuration: binding interfaces to their implementations and configuring application properties.
这是进行所有典型Guice配置的地方:将接口绑定到其实现并配置应用程序属性。
Configuring security for the example application.
配置示例应用程序的安全性。
应用推荐