We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.
我们将研究WebSphereII过程模型,并描述受信任的包装器与设防包装器之间的不同;后者是研究分区数据库资源的先决条件。
Instead, members have to give trusted friends or family the information needed to log in to the site and start the notification process if something should happen.
但是会员需要填写他信任的朋友或家人的信息才能登陆,如果出了什么事,就会启动通知程序。
Below is an overview of why the review process shouldn't always be trusted by investors.
下文概述了投资者为何不能完全信任所谓评级流程的问题。
Tip: If you are using DBACCESS for deployment to Informix and you machine is not a trusted client, MTK will prompt you for a password during the deployment process.
提示:如果是使用DBACCESS来实现到Informix的部署,并且所使用的机器不是受信任的客户机,那么在部署过程中MT k会提示输入密码。
In the process Kurt had graduated from business adviser to trusted friend.
在这个过程中,科特从商业顾问慢慢变成了一个值得信赖的朋友。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
What would happen if more of us dropped our guard and trusted the process of life?
如果更多的人卸下防卫来相信生命的过程,将会怎么样呢?
This process may be expedited if the relationship is built on some existing relationship or "guanxi" such as kinship, the introduction of a mutually trusted third party, etc.
但这种进程也有可能加快,前提是已经有了一些既有的关系、“裙带”、或者是共同信任的第三方介绍等。
The process that fills this role is often not trusted or seen as worthy of attention, for when we do engage it, we may make mistakes in perception or in decision making.
它的意见通常被认为是不可信或不值得被关注的,若我们当真了,倒是会形成错觉或做出错误的决定。
In the process, we would lose some peace of mind and self-respect. We would also demonstrate that we cannot lie trusted, since we advertise our dishonor by telling our family and friends.
在此过程中,我们会失去心灵的宁静和自尊,既然我们会给家人或朋友张扬这一不光荣的事情,说明我们不值得信赖。
A user could access to trusted services in trusted computing platform only if he was authorized. So authorization is a key process to achieve trusted for platform.
用户获取可信功能必须通过平台的授权认证,因此授权认证是实现平台可信的一个关键环节。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
应用推荐