One approach that can provide relief for you, or for customers who are facing this problem, is to use the processor affinity setting methods available on the operating systems.
对于您或者那些面临这个问题的用户,有一种方法可以提供帮助,那就是使用操作系统中提供的处理器关联设置方法。
This approach would provide a transparent and timely migration without the operating system or application being aware that it occurred.
这种方法将提供一种透明且及时的迁移,而操作系统或应用程序并不知道此迁移过程的发生。
In rare cases, where application isolation is not a concern but running applications under different operating system identities for accounting purposes is desirable, the third approach can be used.
在某些很少见的情况下,并不关心应用程序隔离,但是希望以不同的操作系统身份运行应用程序以便审计,那么可以使用第三种方法。
Note the similarities between this approach and the virtualization approach for running multiple operating systems.
注意,这种方法和运行多个操作系统的虚拟化方法有一些相似之处。
The downside to this approach was that the guest operating system had to be modified for PV. The upside was that you can achieve near-native performance in some cases.
这种方法的缺点是客户操作系统必须针对PV进行修改,优点是在某些情况下您可以得到近乎本机的性能。
This approach has lead to significant inefficiencies, risks and inflexibilities as one of the parties is bearing all the costs of building, maintaining and operating the portal.
作为承担所有的构建费、维护费和操作门户所产生的费用的各方中的一方,这种方法已经导致了明显的低效率,并且产生风险,缺乏灵活性。
The downside to the paravirtualization approach is that the operating system is aware that it's being virtualized and requires modifications to work.
半虚拟化方法的缺点是操作系统知道它被虚拟化,并且需要修改才能工作。
It is important to keep in mind, though, that in keeping with this approach, often many services become outsourced, which in turn may lead to lower operating costs but at the expense of employees.
记住一点很重要,然而,如何这么做,许多服务会被外包出去,进而导致更低的运营成本同时牺牲了员工利益。
The first approach is to write custom wsadmin scripts and protect them using operating system permissions to ensure that each administrator can only run the scripts for his servers.
第一个方法是编写自定义wsadmin脚本,并使用操作系统权限对其进行保护,以确保每个管理员只能为其所属的服务器运行这些脚本。
The Lguest approach also simplifies the overall code requirements, requiring only a thin layer in the guest and also in the host operating system.
使用Lguest这种方法还减少了总代码需求,仅需在来宾操作系统和宿主操作系统中使用一个瘦层。
This is the approach taken by Apple, and their Internet-facing routers (and indeed, operating systems) will automatically detect an appropriate 6to4 gateway if the ISP supports it.
这是Apple公司采用的方法,如果ISP支持该方法,Apple面向互联网的路由器(实际上是操作系统)将自动检测到合适的6to4网关。
User-Mode Linux (UML) is another approach that modifies a guest Linux kernel to run on top of another Linux operating system (without hypervisor extensions).
User - ModeLinux (uml)则是另一种方式,它能修改guest Linux内核使其运行在另一个Linux操作系统上(无hypervisor扩展)。
Xenocode approach USES a virtualization solution which emulates core operating system functionality.
Xenocode使用一种可以模拟操作系统核心功能的虚拟化方案。
Orga- nizations operating in the age of e-mail and the Internet need to adopt a more holistic approach to e-mail management.
在电子邮件和互联网时代运营的公司需要用一种更加全面的方法来管理电子邮件。
Explains Dr. Brown, "There's absolutely no possibility that 50 years from now this system will be operating as it does now... I want to approach this as a solvable problem.
布朗博士解释说:“自现在起50年后,这个系统绝对不可能象现在一样运作,我想把这作为一个可解决的问题来对待。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
Xen popularized the PV approach (discussed in the previous section), which reduced the degradation of performance by making the guest operating system driver aware that it was being virtualized.
Xen使PV方法(上一小节介绍过)得以流行,PV方法通过使客户操作系统驱动程序意识到它正在被虚拟化来减少性能降低幅度。
In modern America that approach has morphed into Chapter 11, a structure that allows companies to continue operating and prevents creditors from foreclosing on the business.
在现代美国,上述方式演变为《美国破产法第十一章》(以下简称《第十一章》),新的法律结构允许公司破产后继续经营,而且阻止债权人取消公司的赎回权。
Practical operating has proved that the approach is rational and effective.
实际运行证明该方法合理有效。
Com (component object Model) technology as a new software developing method can provide general approach span programming language, operating system even network to visit component object.
技术是一种新的软件开发方法,它提供了跨越编程语言、操作系统甚至网络来访问组件对象的通用途径。
An approach to congestion problem is presented, which combines OPF (Optimal Power Flow) and CPF (Continuation Power Flow) and maintains the system operating within voltage security margin.
采用将最优潮流与连续潮流相结合的方法解决阻塞问题,并使系统运行在电压安全裕度之内。
If you adopt the plodding, methodical approach I describe, you will probably have your program operating the first time.
假如你采纳我建议的放慢脚步、有条不紊的方式,你将很可能第一次尝试就能获得自己的程序操作。
So, an effective approach to reducing accidents and raising maintenance efficiency is to implement real-time monitoring, measurement and analysis of vibration of operating units.
对机组运行中的振动情况进行实时的监视、测量与分析,是减少机组事故、提高维修效率的有效途径。
RSCAM program system, using Monte Carlo method with albedo approach, is used to calculate streaming neutron radiation field in reactor cavity and containment operating hall.
用具有反照率近似的蒙特卡罗方法编制的RSCAM程序系统计算反应堆堆腔内及安全壳操作大厅中的中子辐射场。
Future leasing model must be to meet the operating needs of the lessee, and lessee's cash flow match, take a flexible approach also rent.
未来的租赁模式,必然要满足承租人的经营需求,与承租人的现金流相匹配,采取灵活的还租方式。
Without the safety approach in a systematical way, the existing safety technologies are only limited to application layer, or operating system layer, or network layer and so on.
无系统防危的观念:现有的防危机制通常只局限在应用级、操作系统级或网络级中的某个层次,且各层防危机制联系非常松散、一致性差。
The result shows that global coordination and optimization of process operating systems is achieved with the proposed approach.
结果表明:基于智能体的方法能实现多个运行决策的全局协调和集成,达到过程运行系统整体优化的目标。
The constitution of the system, basic operating principle, the approach implemented with FPGA, video mixing method and the practical application effect are introduced, the block diagrams are given.
介绍了该系统的组成、制式转换的基本工作原理、用FPGA实现的途径、视频混合的方法和实际应用效果,给出了方框图。
Through fuzzy operating and adopting the approach of software query on controlling, a total controlling table was finally obtained.
通过模拟的模糊运算,得出总控制表,采用软件查询的方法进行控制。
Through fuzzy operating and adopting the approach of software query on controlling, a total controlling table was finally obtained.
通过模拟的模糊运算,得出总控制表,采用软件查询的方法进行控制。
应用推荐