A data request may contain the following components.
一个数据请求可能包含如下组成部分。
Ensuring instance resource, user, and data request threshold policies are in place.
确保建立实例资源、用户和数据请求阈值策略。
Often, the data request on the current page is based on the response data from previous pages.
通常,当前页面上的数据请求是基于前一个页面中的响应数据的。
After receiving the definition response data, the browser sends the data request to the server.
接收到定义响应数据后,浏览器向服务器发送数据请求。
Without a data request threshold policy, you do not know the size of the queue of data requests.
如果没有数据请求阈值策略,就无法知道数据请求队列的大小。
Data request threshold policy ensures data requests to the application can be processed immediately.
数据请求临界值策略保证应用程序的数据请求能够得到即时处理。
The source takes the item data request and prepares the actual data to be transferred to the destination.
源接收到项目数据请求,并准备要传输到目标的实际数据。
When a hypervisor is flawed or compromised, all instance resources and data request queues are compromised.
如果虚拟化系统管理程序有缺陷或被攻破了,那么所有实例资源和数据请求队列就都暴露了。
When a process waits for a block device data request to complete, it incurs I/O wait time, and all idle time becomes wait time.
当一个过程等待一个块设备数据请求完成时,它会增加 I/O等待时间,而所有空闲都会变成等待时间。
Data request threshold policy to ensure data requests to the applications sent by users concurrently can be processed immediately.
数据请求阀值策略,以确保用户并发向应用程序发送的数据请求,可以被立即处理。
Data request threshold policy: Ensures data requests to the application can be processed immediately below or at the threshold level.
数据请求阀值策略:确保所有向应用程序发送的、低于或等于阀值水平的数据请求都可以被立即处理。
Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.
接下来,使用者希望了解SaaS、PaaS和IaaS用户、资源和数据请求安全策略的安全关注重点是什么。
You can either develop each policy type individually or combine all three policy types - resource, user, data request - into one threshold policy.
您可以分别开发每个策略类型,或者将三个策略类型—资源、用户、数据请求—结合为一个阀值策略。
For the buffer processing, the MFC treats a zero-size data request as a no-op, so I can go ahead and issue requests even if there is no data to read.
对于缓冲区处理,MFC 将大小为零的数据请求当作无操作来对待,所以即使没有数据可读取了,也可以继续发出请求。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
When the client receives a context response, start response, or data from the Web service, it processes the message and then makes a data request call to request more data.
当客户机收到上下文响应、启动响应或来自Web服务的数据后,客户机将处理消息,然后发出数据请求调用以请求获得更多数据。
This paper puts forward the generation model of statistics accounting information in ERP system by analyzing the data request of China's enterprise statistics accounting.
通过对我国企业统计核算数据要求的分析,提出了ERP系统中的统计核算信息生成模型。
On the negative side, the container's response to load conditions and data request patterns is unpredictable, so extensive scenario-based load testing must be added to the development process.
从消极的方面看,容器对装入条件和数据请求模式的响应是不可预知的,所以必须在开发过程中添加大量的基于方案的装入测试。
Data request threshold policy: the provider sets data request threshold levels below the maximum number of data requests and the maximum size of data requests that users can send concurrently.
数据请求阀值策略:供应商将数据请求阀值水平,设置为低于数据请求的最大数量,以及用户可并发发送的数据请求的最大大小。
Each request carries some data over the network; if the request does not find any updates on the server, this data transfer is a waste.
每一次请求都要在网络上传输一些数据;如果请求未在服务器上发现任何更新,那么这个数据传输就是浪费的。
Therefore you have to explicitly request this data.
因此,必须显式地请求这些数据。
Users can also request report data based on these parameters.
用户还可以根据这些参数请求报告数据。
The term for this internal tagging of response and request data is data correlation.
这个响应和请求数据的内部标签的条件是数据相关性。
In addition, each takes a callback that handles the returned data from the request.
另外,每个方法都接受一个处理从请求返回的数据的回调。
This allows the receiving node to validate its incoming data and request retransmission when an error is found.
这支持接收节点验证输入数据,并在发现一个错误时请求重发数据。
Pull technology is when the handheld device initiates the communication using its gateway to request data.
拉技术是在手持设备使用其网关发出通信以请求数据时。
The request data is wrapped inside a failed event and saved inside the common database.
请求数据被放在一个失败事件中并保存在通用数据库中。
There are four possible ways to pass logon data in a request to the authentication provider.
把请求中的登录数据传递给身份验证提供者有四种方法。
It transforms the request body into the SCA data object and passes the request data to other SCA application components.
它将请求体转换成sCA数据对象并将请求数据传递到其他SCA应用程序组件。
For example, if you want to retrieve data, use a GET request; to create data, a POST request; to update data, a PUT request; and finally, to delete data, a delete request.
例如,如果您想检索数据,则使用GET请求;要创建数据,则使用POST请求;要更新数据,则使用PUT请求;最后,要删除数据,则使用DELETE请求。
应用推荐