使用SSH创建一个可信的主机环境。
框架的主要逻辑性单元是服务类,末端点以及主机环境。
The framework's main logical units are service class, endpoints, and host environment.
最早是主机环境,所有的一切都存在于远程系统上。
It used to be that with mainframe environments, that everything lived on a remote system.
在某些虚拟主机环境中,访问这些设置的权限受到限制。
In some Shared hosting environments, access to these Settings is restricted.
最后,我要提一下作为一种替代方案来设置公私ssh密钥对的可信主机环境。
Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.
虚拟化支持云计算环境,它是一种动态的主机环境,提供了看似无限的计算资源。
Virtualization permits cloud computing environments, which are dynamic hosting environments that provide seemingly infinite computing resources.
由于嵌入式软件对目标硬件平台的依赖性,在宿主机环境下无法编译运行。
Due to the dependency of embedded software on the target hardware platform, it can not be compiled and operated under the host environment.
确保主机环境与VMwareServer兼容并能满足guest操作系统需求和限制。
Make sure that the host environment complies with the VMware Server and guest operating system requirements and limitations.
集群涉及到了为一个或者多个程序或者虚拟机系统,将一组的物理系统合并为单独的主机环境。
Clustering involves combining a group of physical systems into a single hosting environment for one or more applications or virtual systems.
您的客户或领导现在可以在不需要安装或配置的在线主机环境上试用许多Rational产品。
Your customers or leads can now test-drive several Rational products in an online hosted environment with no installation or configuration required.
对于分布式的主机环境,您可以使用相同的数据描述,这大大减少了开销,提高了数据的一致性和完整性。
You can use the same data descriptions for distributed and host environments, which reduces overhead and improves data consistency and integrity.
因此,恶意主机环境下移动代码保护技术的研究具有重要的理论和现实意义并受到极大的重视。
So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.
在恶意主机环境下,软件系统可以被逆向工程或被篡改,其机密性、完整性与可用性受到威胁。
In malicious host surroundings, a software can be reverse engineered and also can be tampered with.
最著名的是难以在目标环境中运行测试程序以及类似程序,而且如果它与主机环境不同,配置起来相当麻烦。
Most noticeably, it's hard to run test programs and the like in the target environment, and if it differs from the host environment, this makes configuration a dodgy experience.
由于虚拟机将使用与主机相同的处理器作为基准,因此要求我们克隆的主机环境和物理服务器具有兼容的处理器类型。
Because the virtual machine will use the same processor as the host as a baseline, it requires that the host environment and the cloned physical server have compatible types of processors.
在一个客户机-网关-主机环境中,这些身份验证选项是在客户机和网关上设置的,而不是在主机上设置的。
In a client-gateway-host environment, these authentication options are set on the client and gateway, not on the host machine.
导致usn回滚的一个基本原因与在ActiveDirectory多主机环境中处理删除对象的方式有关。
One underlying cause of USN rollback has to do with the way that object deletions are processed in the Active Directory multi-master environment.
我主要用它们来编译和测试我在其他系统上写的代码,同时也可以方便地在不同的主机环境下运行客户端和服务器。
I use these mainly for compiling and testing the code that I write on other systems, and to allow me to run clients and servers on the various hosts.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
如果用户的主机环境没有达到配置要求,WordPress用户将无法升级到WordPress 3.2 (内置机制会拒绝升级行为)。
WordPress users will not be able to upgrade to WordPress 3.2 if their hosting environment does not meet these requirements (the built-in updater will prevent it).
使用DB 2存储过程的方法可以提供一种良好管理的、可控制的可用于数据访问的环境——这在大型主机领域中是必需的。
The DB2 stored procedures method provides for a well managed and controlled environment that can be used for access to the data — this is a must in the mainframe world.
每个节点使用某个贡献包、某个组合和运行节点的环境的属性(例如主机和端口)进行配置。
Each node is configured using a contribution, a composite, and the properties of the environment, like host and port, where the node is run.
在比较高的级别,为了在SOA环境中集成一个主机应用程序需要采取两个步骤。
At a high level, two steps must be taken to integrate a host application into an SOA environment.
使用这些解决方案,您将可以快速而轻松地应对在一个SOA环境中集成主机应用程序与其他业务应用程序的上述挑战。
Using these solutions, you quickly and easily can meet the challenge of integrating host applications with other business applications in an SOA environment.
进一步查看就会发现,客户端信息面板显示了客户端主机和环境的详细信息。
Looking closer, the client information panel shows details of the client host and environment.
因此非常容易将IBC站点分发给主机托管环境和其他开发人员,或者进行现场演示。
This makes it very simple to distribute the IBC site to the hosting environment and other developers, and to transport for on-site demo purposes.
主机托管环境具有快速的互联网连接,通常处于数据中心环境中,并由专业的IT人员管理。
The hosting environment is on a fast Internet connection in a typical data center environment and is managed by professional IT staff.
通过向代理主机提供JAR文件或JAR文件的位置,设备在其“本地”网络环境找到代理主机然后用它注册。
The device finds a surrogate host in its "native" network environment and registers with it, providing the surrogate host with either a JAR file or the location of a JAR file.
为了定义哪些主机参与分区环境,必须更新db 2 nodes . cfg。
To define which hosts are participating in partitioned environment, db2nodes.cfg must be updated.
为了定义哪些主机参与分区环境,必须更新db 2 nodes . cfg。
To define which hosts are participating in partitioned environment, db2nodes.cfg must be updated.
应用推荐