Many users employ a shadow copy of their database (Figure 4) to support large and ad-hoc queries against the operational data.
许多用户使用数据库的影子副本(图4)支持基于操作数据的大型专用查询。
Password file-base authentication: authentication is based on the password and shadow files or interaction with Network Information System (NIS), on the machine where the database server is installed.
基于密码文件的身份验证:身份验证基于安装数据库服务器的机器上的密码和影子文件,或者与Net workInformationSystem (NIS)的交互。
This graph shows the number of messages that were in the database I was running a test on, plotted over time. I added in a logo, a drop shadow effect, and a stats table of the test run.
图 7是一个线图,显示了测试的数据库中的一些信息,添加了一个徽标、阴影效果和测试的统计表。
This thesis provides a method of organizing the shadow memory of main memory database. Detailed storage structure and access strategy are also included.
提出一种适合内存数据库的“影子内存”组织方法,并给出具体的内存空间的组织管理、存储结构和存取策略。
New database of remote shadow copies was created by the Volume shadow Copy Service.
卷影复制服务已经创建远程卷影副本的新数据库。
New database of remote shadow copies was created by the Volume shadow Copy Service.
卷影复制服务已经创建远程卷影副本的新数据库。
应用推荐