Targland plans to halt this population decline by blocking the current access routes into the desert and announcing new regulations to allow access only on foot.
塔格兰德计划通过封锁目前进入沙漠的通道,并宣布新的规定,即只允许步行进入沙漠,来阻止这种人口的减少。
It's a complex system wherein data is copied to multiple intermediate devices, usually to speed up access to files when millions of people are trying to access the service at the same time.
这是一个复杂的系统,数据被复制到多个中间设备,通常是为了在数百万人同时试图访问服务时加快文件访问速度。
Our spirit has access to this world through the mind in the same way that we plug into the phone socket to get internet access.
我们的精神以同样的方式经由我们的意识进入到这个世界,我们都要插入电话插座才能获得因特网的上网许可。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
That means that we prevent such access via access controls on our backend as well as strict policy prohibitions.
这意味着我们通过访问控制在后台阻止这样的访问,以及严格的政策禁令。
This configuration provides the ability to assign different permissions and access levels based on access from the trusted network and the untrusted Internet.
这个配置提供根据从可信网络还是从不可信互联网访问分配不同的权限和访问级别的能力。
For each profile, an access level of NONE prevents access, and an access level of READ (or higher) allows the user or group to connect.
对于每个概要文件,NONE访问级别将阻止访问,READ(或更高)的访问级别允许用户或组进行连接。
This can range from no access at all, to partial access, to complete access, to no access because you're not collecting any identifiable information in the first place.
其范围从完全无权访问、部分访问权限、完全访问权限,一直到因未首先收集任何可标识信息而不存在访问权限。
Access server - Enables the Management Console to access and configure CDC instances.
访问服务器-支持管理控制台访问和配置cdc实例。
Access plan describes the access path that the DB2 optimizer has chosen for accessing data for an SQL statement.
访问计划描述访问路径,这些路径是DB 2优化器为sql语句访问数据而选择的。
To obtain access, the user requests access to a specific application, including specific roles or access levels, based on the user's needs.
为了获得访问权限,用户将基于自己的需要请求对特定应用程序的访问,包括特定角色或访问级别。
RP grants access: The user is granted access to the protected resource.
RP授予访问权:授予用户对受保护资源的访问权。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Any application that the policy allows access to can access the files that are under guard points as long as the application USES system libraries to access the files.
策略允许访问的任何应用程序都可以访问保护点下的文件,前提是该应用程序使用系统库来访问文件。
Upon successful validation, the service provider issues the access token to access the protected resources.
成功确认之后,服务提供商颁发访问令牌来访问受保护资源。
On the other hand with RACF, UPDATE access supersedes any access which had previously been granted to GROUP1, since access is cumulative.
在另一方面,RACF中的UPDATE访问权限将取代先前授予group1的所以权限,因为访问权限是累加的。
Access proceeds according to the storage access protocol required for the type of store.
根据存储类型所需的存储访问协议,访问继续进行。
Workbench-level access includes access of workbench contributions, such as editors, views, and perspectives.
工作台级访问包括对工作台内容(例如编辑器、视图和透视图)的访问。
The customer login cannot access the confidential tables, and has read-only access to certain data; the employee login has full access.
顾客登录不能访问存储机密数据的表,而只有对特定表的只读权限;雇员登录拥有全部的访问权限。
For HTTP access services, this value should be set to the fully qualified external hostname used to access the HTTP access service from a browser.
对于HTTP访问服务,这个值应该设为用于从浏览器访问HTTP访问服务的全限定外部主机名。
Data access services provide or prevent access to data based on authorizations and restrictions (policies and rules for access).
数据访问服务基于授权和限制(策略和访问规则)来提供或阻止数据访问。
For instance, you can allocate memory for caching, which reduces disk access, or access resources over the network rather than reading off the local disk.
例如,可以为缓存分配内存,这可以减少磁盘访问或通过网络的资源访问。
Require all users to authenticate with the server and to verify server access before checking database access.
要求所有的用户都必须在服务器上进行身份验证,并且在检验数据库访问前确认服务器访问。
There are two options for user access to a table while a RUNSTATS is running against that table: allow read access and allow write access.
当对一个表运行RUNSTATS时,有两种用户访问选项:允许读访问和允许写访问。
Without well-built, well-maintained roads, goods cannot access markets, children cannot access schools, the sick and injured cannot access health care.
如公路建设质量不好、养护不善,则贫困人口的商品或货物无法进入市场,其子女无法到校上学,病人和受伤之人也无法获得医疗服务。
Noatime will disable recording of access times. Not using access times may improve performance.
noatime将禁止记录存取时间,不使用访问时间可以提高性能。
Relative tablespace weight: a function of access density and access latency.
相对表空间权重(Relative tablespace weight):访问密度和访问延时的函数。
Restrict SSH access by controlling user access.
通过控制用户访问限制ssh访问。
After the OAuth handshake completes, the access token is issued and the consumer can use the access token to access the protected resources on behalf of the user.
OAuth握手完成之后,访问令牌颁发,客户可以使用这个访问令牌代表用户访问受保护的数据。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
应用推荐