Besides the access approach, the modes of access to overseas market also included access scale, access order, expansion speed and industry format choice.
零售商海外市场进入模式不仅仅包括进入方式,还包括海外市场进入规模、进入顺序与扩张速度以及海外市场进入的业态选择。
Even using objects to encapsulate statistics tracking, the traditional approach would require multiple calls for every user operation and every access to a resource.
即使使用对象来封装统计跟踪,传统的方式对于每个用户操作和每个资源访问,也都需要多个调用。
This approach hinges on the use of services as the key enabler to access and on the interaction of data and processing between multiple systems or even business partners in an ecosystem.
这种方法的关键在于两点,一是将服务作为关键启动程序进行访问,二是生态系统中多个系统甚至业务伙伴之间的数据和处理的交互。
With this approach, you leverage the application programming interfaces (APIs) exposed by your applications to access both the data and the functionality encapsulated by legacy systems.
使用这种方法,您可以利用由应用程序暴露的应用程序编程接口(API)来访问旧系统封装的数据和功能。
Can you access each data source and simply join the resulting information, or will there be problems with this approach?
是否可以访问每个数据源并直接合并产生的信息?这种方式是否有问题?
Applications can access relational data from a server and match up the result in a browser in a unique and declarative approach.
应用程序可以访问服务器中的关系数据,并在浏览器中以独特的声明式方法对结果进行协调。
A federated approach to distributed data access can provide the required levels of data synchronization without an ODS.
联合的分布式数据访问方法无需ods即可提供所需级别的数据同步。
Figure 2 shows a direct coupling approach, in which business applications create custom access to information.
图2显示了一种直接耦合方法,其中业务应用程序创建自定义的信息访问。
One interesting side effect of this approach is that it allows us to access private and protected members of a class via a closure, which can be handy for unit testing classes.
这种方法的一个有趣的副作用是允许通过闭包访问类的私有成员和受保护成员,这有利于对类执行单元测试。
A more flexible approach is to use a URL resource to access a property file that can be placed anywhere in the file system.
更灵活的方法是使用在文件系统中任何地方都可以放置的访问属性文件的URL资源。
This becomes challenging when the patient is running a marathon at the same time; providing full access to current functions while enhancing those functions in a progressive approach.
而这要在病人参加马拉松的同时进行就变得富有挑战性了;需要在渐进方法中提供对当前功能的完全访问,并同时对这些功能进行增强。
There are two other aspects of an approach to SOA that should be established early on: the provision of internal or external access to services, and an approach to service granularity.
实现 SOA的方法有两个方面应该在早期确定:对服务的内部或外部访问的提供,和一个解决服务粒度的方法。
This is important because it illustrates one of the key flaws of this simple, password-only approach—namely that, once authenticated, a user can access any or all of the protected actions.
这很重要,因为它暴露了简单的、仅基于密码的方法的重大缺陷 ——只要成功登录,就可以访问所有受保护的操作。
If the application access pattern is predominately update access, then pessimistic approach might be advantageous in that it avoids optimistic concurrency update failures.
如果应用程序访问模式主要是更新数据,那么乐观锁定方法能有利地避免乐观并发性更新的失败。
The ODFDOM API employs a layered approach to access documents.
ODFDOMAPI采用一种分层的文档访问方法。
For example, by focusing on data access or validation, you can prototype and test potential solutions to figure out the best approach for your scenario.
比方说,通过关注数据获取或有效性验证,你能为潜在的解决方案构建原型并进行测试,从而找出适合你的情景的最好的方法。
But in practice America's regulatory approach has left much of the country with a cable monopoly for truly fast broadband access.
但在实践中,美国的管制方式已经把国家大部分地区交给了一个电缆垄断以获得真正快速的宽带接入。
For the alternate approach, it is not necessary to configure a federated access to the remote database.
对于第二种方法,不需要配置对远程数据库的联邦访问。
The approach in Listing 6 is just one of many that attempt to sever data retrieval from data access.
清单6中的方法只是切断数据检索和数据访问的尝试之一。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Preventing write access should be seen as an additional approach which should be paired with other measures.
禁止写访问应该作为与其他措施结合使用的额外措施。
Rarely does an application access only one table, so by taking this approach, some operations would require instantiating and working with more than one interface.
应用程序很少只访问一个表,所以有些操作需要实例化并使用多个接口。
Implementation of Enterprise Information Systems access in Service-Oriented Architecture: a bottom-up approach.
实现对面向服务的体系结构中企业信息系统的访问:自底向上方法。
The first method is to access the Windows Registry directly, however, this approach can be complex and cumbersome.
第一个方法是直接访问WindowsRegistry,然而,该方法是复杂且麻烦的。
Another option, which takes a little more effort, but allows viewing the access plan utilizing potential (" virtual ") indexes, is to use the following approach.
另一个方法可能需要较多的操作,但是允许利用潜在的(“虚拟的”)索引查看访问计划。
The new products on the market, for example IBM Information Server 8 provide support for both direct database access and integration approach.
市场上的新产品,例如IBMInformationServer8就支持直接数据库存取和集成两种方法。
As already mentioned, the LOAD FROM CURSOR operation combined with the federated access requires more effort in terms of configuration than the approach that is presented next.
正如前面提到的,与方法2相比,结合使用LOADFROM CURSOR操作和联邦访问需要做的配置工作比较多。
The Embedded SQL approach for DB2 data access involves the use of an application preprocessor to translate and replace all of the SQL references with native access interfaces to the DB2 server.
用于DB 2数据访问的EmbeddedSQL方式需要使用应用程序预处理器,将所有SQL引用转换为DB 2服务器的本机访问接口。
The Embedded SQL approach for DB2 data access involves the use of an application preprocessor to translate and replace all of the SQL references with native access interfaces to the DB2 server.
用于DB 2数据访问的EmbeddedSQL方式需要使用应用程序预处理器,将所有SQL引用转换为DB 2服务器的本机访问接口。
应用推荐