The data in this log contains information about the devices connected to the system and any faults and problems recorded by the system during the boot and operational process.
此日志中的数据包含关于连接到系统的设备的信息,以及在启动和操作过程中系统记录的任何错误和问题的信息。
A file system that spans two volumes is allocated for transaction log data.
我们为事务日志数据分配了一个跨越两个卷的文件系统。
Due to the large amount of data in the audit log table, a single INSERT statement will usually fail because the data per transaction exceeds the log file size of the database system.
因为审核日志表格里有大量的数据,单独的insert语句通常会失败,这是因为每个事务的数据超过了数据库系统里的日志文件的容量。
If the system fails, the first thing it does upon restart is to reapply the effects of any committed transactions that are present in the log but whose data blocks have not yet been updated.
如果系统出现故障,重新启动时要做的第一件事就是重新应用所有已提交事务的作用,所有这些已提交的事务都位于日志中,但是它们的数据块尚未更新。
A file system that spanned two volumes was allocated for transaction log data.
一个文件系统横跨两个卷,用于事务日志数据。
These include rotating log files so filesystems do not become full, backing up data, and connecting to a time server to keep your system time synchronized.
这些任务包括轮转日志文件以避免装满文件系统、备份数据和连接时间服务器来执行系统时间同步。
A file system, which spans two volumes, is allocated for transaction log data.
一个文件系统横跨两个卷,用于事务记录数据。
You may want to consider using a logging system that is non-blocking, so that your end user never waits for you to log data.
您可能会想考虑使用一个非阻塞的日志系统,以防止您的终端用户等待您记录数据。
The basic method by which HADR replicates data is to send DB2 log writes simultaneously to the local disk and to the standby system.
HADR复制数据的基本方法是将DB 2日志写同时发送到本地磁盘和备用系统。
You can manually transfer the IBM Support Assistant Lite collector to the agent system and run it to collect agent log files and other problem determination data.
您可以手动将这个IBMSupportAssistantLite收集器传输到代理系统并运行它,从而收集代理日志文件和其他问题确定数据。
The Test Log viewer has been updated, with features including defect-tracking system integration and the ability to attach external files, such as data or screen shots.
TestLogviewer已经被更新,并且有包含缺陷跟踪系统集成和附带外部文件的能力的特性,比如数据或者截屏。
This enables a self-learning robust system that can push the most accurate data to new users who log into that location.
这实现了一种自主学习的健壮系统,能够为登录到该位置的新用户推送最准确的数据。
On the basis of log geology evaluation and norm, combining with the log data, the method to evaluate oil gas reservoirs exactly is presented by using grey system theory.
本文利用测井资料,依据测井地质评价油气储层的分析准则,提出灰色理论精细评价油气储层的处理方法和解释系统。
To move a system database data or log file as part of a planned relocation or scheduled maintenance operation, follow these steps.
若要将移动系统数据库数据或日志文件的操作作为预先安排的重定位或预定的维护操作的一部分,请执行下列步骤。
In network system there is a large amount of log audit data which contain much information related to security.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
This paper introduces the structure, design idea and implementation of the log data handling and interpretation system.
文章介绍了测井资料处理解释系统的总体结构、设计思想及其实现。
SD-2 log system data transmitted process is analyzed in the article. The extended memory. Interrupt and DMA technology is used in the program according as log practice require.
本文分析了SD-2测井系统数据传输过程,结合测井实际的需要,在软件的编写中,应用了中断、扩展内存、显存直接操作等技术。
This paper describes a reliable and efficient data concentrating system (DCS) based on the triggers, log tables and an algorithm that can update remote data reliably.
论述了基于触发器、日志表和可靠远程复制数据算法实现的数据集中系统,系统由数据捕获和数据复制两部分组成。
The maintenance management: mainly refers to the librarians'maintenance, code maintenance, data backup and log management of the system.
维护管理:主要是图书管理员维护,代码维护,数据备份和系统日志管理。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
Thereby, the approach of getting maximum closed log module through analyzing and evaluating data coming from control system to assess loop performance is meaningful.
因此,利用采集的过程数据运用求取最大闭环对数模的方法来对控制回路的性能进行评价。
The redundant data in log files and the delay for detecting abnormal trails are the inherent problems existing in the traditional secure monitoring subsystem of a computer system.
传统的计算机设计系统的安全监视功能存在日志数据冗余和异常线索检测时延过长等固有问题。
It is one of the most important signs of progresses in modern log technology to establish a strict and integrated check system of log data quality.
建立严格与完整的测井质量检测系统是近代测井技术进步的重要标志之一。
An exact statistical fit and auto-correction system for neutron log data has been set up with the use of image network statistics, network weighted analysis (algorithm) and fit.
利用图象网络统计、拟合、加权分析技术,提出中子测井资料环境影响校正分析方法和处理模式,建立起精细的统计、拟合自动分析校正系统。
In the system, we get the hidden information by on-line or off-line analyzing the data in user log. According to the result of data mining, the performance of system is Evaluated.
并且对用户日志数据通过离线或在线的方式进行分析,得到用户的培训效果,以此分析评价系统性能。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
By extracting information from workflow traces, such as system log data, workflow mining aims to discover the actual behavior of a workflow process.
工作流挖掘抽取系统日志信息,挖掘流程的真实运作模型。
There's the system-wide Address Book menu that allows instant access to all of your contact data, monitoring of incoming calls, a call timer, a comprehensive call log, & much, much more.
它包含一个贴合系统的地址簿菜单,以便随时得到你的联系人数据,监视呼入电话,定时电话,智能电话记录,还有更多。
Two or more contiguous data tracks establish a band, and a band establishes a respective segment in a log-structured file system.
两个或更多相邻的数据轨道建立一个带,并且带建立日志结构文件系统中的各个段。
In logging and data-processing, there always are different data format in different log-system.
测井现场和资料处理工作中,经常遇到各种不同的数据采集系统而有不同的数据格式。
应用推荐