例如,支持组件使用配置在这个应用软件服务器中的RDBMS数据源,测试这个组件可能包括为一个本地rdbms或者任何其它文件系统对它进行配置。
For instance, supposing that the component USES a RDBMS data source configured in the application server, testing the component might involve configuring it for a local RDBMS or any other file system.
在联邦系统中,服务器表示远程数据源上的一个数据集合。
In a federated system a server represents a collection of data on the remote data source.
主数据通常分散在企业中的多个数据源系统中,这会导致主数据不一致、不完整且质量差。
Master data typically is scattered throughout the enterprise in multiple source systems which makes it inconsistent, incomplete and of poor quality.
如果一个数据源中的数据定义被更改,对其他系统的影响就会加倍,而且通常很难预测。
If data definition in one data source is changed, the impact to other systems is multiplied and often unpredictable.
MDM系统是企业中主数据的权威性数据源。
The MDM system is the authoritative source of master data in an enterprise.
确保列表中的某一个数据源与客户端系统上的一模一样。
Make sure that one of the listed data sources is exactly the same as on the client system.
确保列表中的某一个数据源与客户端系统上的一模一样。
Make sure that one of the listed data sources are exactly the same as on the client system.
在此例中,Information Integrator用于合并来自文件系统记录、Oracle和DB 2数据源的数据。
In the example, Information Integrator is used to merge data from file system records, Oracle, and DB2 data sources.
还有一些系统参与者,它们是与您的系统进行交互的外部系统,在数据仓库项目的例子中,将是您要从中提取数据的遗留数据源。
There are also system actors, external systems that your system interacts with, which in the case of data warehouse projects, would be the legacy data sources that you extract data from.
在系统的开发和创建过程中,重用经过证明具有相当灵活性的模式,可以确保一致性和高质量,并且减少维护成本(因为只需要对一个数据源进行更新)。
Reuse of proven flexible patterns in the development and creation of systems can both ensure consistency and quality and reduce maintenance costs by having a single source to update with changes.
为了处理该查询,DB 2查询编译器查阅DB 2联邦数据库系统编目中的信息以及数据源包装器模块中的信息。
To process the query, the DB2 query compiler consults information in the DB2 federated database system catalog and the data source wrapper modules.
联邦数据库系统的用户可以对存储在联邦系统中任意位置的数据进行分布式查询,不管自己的位置在哪里,也不管数据源使用的是哪种SQL方言。
Users of a federated database system can pose distributed queries over data stored anywhere in the federated system, regardless of its location or the SQL dialect of the data source.
Remove不把数据源从文件系统中删除,它只将其从本视图中去除,因为其他的测试进度表或应用程序可能仍旧在使用该数据源。
Remove does not delete the data source from the file system; it merely removes it from this view because other test schedules or applications might still use the data source.
数据源可以是关系数据库、文件系统、Web服务,甚或一系列业务应用程序中包含的自定义数据源。
A data source could be a relational database, a file, a Web Service or even a custom data source included within a line of business application.
围绕数据源组织、数据存储和数据展现等问题,对系统建设中的若干关键技术进行了探讨。
This paper also studies the some critical technology in system building, around the data origin organization, data storage and data exhibition.
本文设计并实现了数据获取系统,主要研究数据获取中的两个关键技术:数据源增量数据获取技术和相似重复记录检测技术。
This paper intends to illustrate the data extracting system design, with focus on two key technologies in data extracting, namely, incremental data extracting and duplicate record detecting.
该系统自实际运行以来,帮助客户能够从大量庞杂的数据源中获得及时准确的业务信息,效果稳定,对类似系统的设计也有很好的借鉴作用。
The system help the customer to get business information effectively and timely from huge data source. It has steadily effect after being used, this is a good model for the design of likely system.
为返回数据源中与查询目标节点相似的节点,首先提取出数据源中长度在固定范围内的所有路径,然后利用关系数据库系统将其与查询路径进行相似性连接,并按相似度从大到小返回所有结果。
To get the source nodes similar to the target query node, firstly the paths whose lengths were within an interval were extracted from the data source, then a similarity join process between them and.
系统中的单机版采用了先进的随机模糊数技术,以试题库作为数据源,实现了实时自动试卷生成;
The unconnected PC version applies advanced random fuzzy technologies and can automatically generate exam papers in real-time by using the question database as data source;
该系统从入侵检测系统和主机系统等多数据源主动收集数字证据,通过完整性算法保证数字证据传输和存贮过程中的完整性。
The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.
该系统从入侵检测系统和主机系统等多数据源主动收集数字证据,通过完整性算法保证数字证据传输和存贮过程中的完整性。
The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.
应用推荐