要进行连接,您需要知道您数据库的用户名、密码和端点url。
To connect, you need to know your database's user name, password, and endpoint URL.
同样,缺乏有效的(或任何)事务策略将对您数据的完整性和一致性造成负面影响。
Likewise, the lack of an effective (or any) transaction strategy will have a negative effect on your data's integrity and consistency.
如果您想要提高您数据的可用性,甚至是商业硬件上的数据,DRBD是一个极好的资产。
DRBD is a great asset if you're looking to increase the availability of your data, even on commodity hardware.
通过终止您的mongrel 进程来停止云环境中的应用程序服务,为数据迁移做好准备。
Stop the application services in the cloud environment in preparation for the data migration by killing your mongrel processes.
我们将检查数据中的一般模式,并向您展示如何使用R找到它们。
We will examine general patterns in the data and show how to find them by using R for you.
如果您的程序是数据的浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以那是不可信的输入。
If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
您的申请将由联合国教科文组织管理人员审阅,并将在我们的数据库中保存6个月。
Your application will be accessed by UNESCO managers and will stay in our database for six months.
如果您可以搜集这些数据,那么您可以确定那些在您的环境中最有效的技术。
If you can gather these data, you can then determine those techniques that are most effective in your environment.
为了开始在示例中使用ZRM,需要为您的数据创建资源模型。
To begin using the ZRM for the sample, create resource models for your data.
这里显示了您的数据处理选择。
因此,如果您不想使用外部映射文件,那么可以使用注释来满足您的数据绑定需求。
So if you wish not to use external mapping file then annotations can be used for your data binding needs.
虽然您可以分步来减少安全破坏的风险,但您的数据还是处于某种危险之中。
Although you can take steps to decrease the risk of a security breach, your data is still in some danger.
关于增加您的数据挖掘知识的其他方法,请参阅参考资料。
For additional ways to increase your knowledge about data mining, plan to check the Resources.
您还应该尽量将索引和重做日志与您的数据分开保存。
You should also try to keep indexes and redo logs off the same volumes as your data.
还有一些额外参数允许您控制数据的其他方面。
A number of extra parameters are available that let you control other aspects of your data.
然而,您将需要转换您的数据以使其更适合此种类型的图表。
However, you are going to need to transform your data to make it more usable for this kind of chart.
在这些情况下,建议您基于数据平衡选择分区键。
In such cases, it is recommended that you choose a partitioning key based on even data balancing.
Rails不会让您摆脱数据完整性问题。
对于您的数据库模式,应当那样做。
让数据库管理员为您创建数据库、模式、表和其他对象。
Have the database administrator create databases, schemas, tables, and other objects for you.
可以让数据库管理员为您创建数据库、模式、表和其他对象。
You can have the database administrator create databases, schemas, tables, and other objects for you.
该数据连接允许您浏览数据库对象及其属性。
The data connection lets you browse the database objects and its properties.
因此,您可以利用本文中所述的全部技术,不仅可修改您的数据,还可修改您的代码。
You can therefore use all of the techniques described in this article not just to modify your data, but to modify your code.
运行该应用程序将在窗口中显示来自数据源的数据,并允许您浏览数据记录并根据需要进行修改。
Running the application displays the data from the data source in the form, and allows you to browse through the records and modify the data as needed.
然后,设计您的数据结构,使其与您计划将来访问数据的方式相符。
Then structure the data in a way that matches how you plan to access it later.
尽管攻击者可能会修改您发送的数据,但是您需要确保组件会按照您希望的方式对您发送的数据进行处理。
You'll need to make sure that the component will interpret the data you send the way you expect, even if an attacker can influence the value of that data.
您不会希望您的数据源指向您的生产数据库服务器。
You wouldn't want your data sources pointing to your production database server.
这里假定您的DB 2数据库访问权限允许您更改数据库中的数据。
It is assumed that your DB2 database access privileges allow you to change data in the database.
这里假定您的DB 2数据库访问权限允许您更改数据库中的数据。
It is assumed that your DB2 database access privileges allow you to change data in the database.
应用推荐