Each request carries some data over the network; if the request does not find any updates on the server, this data transfer is a waste.
每一次请求都要在网络上传输一些数据;如果请求未在服务器上发现任何更新,那么这个数据传输就是浪费的。
Therefore you have to explicitly request this data.
因此,必须显式地请求这些数据。
Users can also request report data based on these parameters.
用户还可以根据这些参数请求报告数据。
When a process waits for a block device data request to complete, it incurs I/O wait time, and all idle time becomes wait time.
当一个过程等待一个块设备数据请求完成时,它会增加 I/O等待时间,而所有空闲都会变成等待时间。
The term for this internal tagging of response and request data is data correlation.
这个响应和请求数据的内部标签的条件是数据相关性。
You can either develop each policy type individually or combine all three policy types - resource, user, data request - into one threshold policy.
您可以分别开发每个策略类型,或者将三个策略类型—资源、用户、数据请求—结合为一个阀值策略。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
In addition, each takes a callback that handles the returned data from the request.
另外,每个方法都接受一个处理从请求返回的数据的回调。
Data request threshold policy to ensure data requests to the applications sent by users concurrently can be processed immediately.
数据请求阀值策略,以确保用户并发向应用程序发送的数据请求,可以被立即处理。
On the negative side, the container's response to load conditions and data request patterns is unpredictable, so extensive scenario-based load testing must be added to the development process.
从消极的方面看,容器对装入条件和数据请求模式的响应是不可预知的,所以必须在开发过程中添加大量的基于方案的装入测试。
Ensuring instance resource, user, and data request threshold policies are in place.
确保建立实例资源、用户和数据请求阈值策略。
After receiving the definition response data, the browser sends the data request to the server.
接收到定义响应数据后,浏览器向服务器发送数据请求。
This allows the receiving node to validate its incoming data and request retransmission when an error is found.
这支持接收节点验证输入数据,并在发现一个错误时请求重发数据。
Data request threshold policy: Ensures data requests to the application can be processed immediately below or at the threshold level.
数据请求阀值策略:确保所有向应用程序发送的、低于或等于阀值水平的数据请求都可以被立即处理。
Pull technology is when the handheld device initiates the communication using its gateway to request data.
拉技术是在手持设备使用其网关发出通信以请求数据时。
Without a data request threshold policy, you do not know the size of the queue of data requests.
如果没有数据请求阈值策略,就无法知道数据请求队列的大小。
Data request threshold policy ensures data requests to the application can be processed immediately.
数据请求临界值策略保证应用程序的数据请求能够得到即时处理。
Data request threshold policy: the provider sets data request threshold levels below the maximum number of data requests and the maximum size of data requests that users can send concurrently.
数据请求阀值策略:供应商将数据请求阀值水平,设置为低于数据请求的最大数量,以及用户可并发发送的数据请求的最大大小。
The request data is wrapped inside a failed event and saved inside the common database.
请求数据被放在一个失败事件中并保存在通用数据库中。
There are four possible ways to pass logon data in a request to the authentication provider.
把请求中的登录数据传递给身份验证提供者有四种方法。
Often, the data request on the current page is based on the response data from previous pages.
通常,当前页面上的数据请求是基于前一个页面中的响应数据的。
The source takes the item data request and prepares the actual data to be transferred to the destination.
源接收到项目数据请求,并准备要传输到目标的实际数据。
It transforms the request body into the SCA data object and passes the request data to other SCA application components.
它将请求体转换成sCA数据对象并将请求数据传递到其他SCA应用程序组件。
For example, if you want to retrieve data, use a GET request; to create data, a POST request; to update data, a PUT request; and finally, to delete data, a delete request.
例如,如果您想检索数据,则使用GET请求;要创建数据,则使用POST请求;要更新数据,则使用PUT请求;最后,要删除数据,则使用DELETE请求。
First, the data in your request must be manually formatted as XML.
首先,请求中的数据必须手工格式化为xml。
The user enters some request data on the client side and submits the data.
用户在客户端输入请求数据,并提交该数据。
Construct a request URL and possibly POST request data.
构造一个请求url,可能还要POST请求数据。
For example, the request zone contains all the data for the current HTTP request.
例如,请求区域包含当前HTTP请求的所有数据。
When a hypervisor is flawed or compromised, all instance resources and data request queues are compromised.
如果虚拟化系统管理程序有缺陷或被攻破了,那么所有实例资源和数据请求队列就都暴露了。
You can now use the Request data type in your process.
现在您可以在您的流程中使用Request数据类型。
应用推荐