Other instances in which this pattern is useful include logging and printing, such as when you want only one instance of a class to access and control one particular printer at a time.
在其他实例中,此模式也是有用的,包括登录和打印,例如,当您想要一个能够每次访问并控制一个特别打印机的类实例。
We've looked at transaction demarcation and logging and you now have a deeper understanding of how each applies to data access objects.
我们讨论过了事务界定和日志,现在对于如何在数据访问对象上应用它们有了更深入的理解。
By dumping the session, we force any continued access to first be revalidated by logging back in.
通过转储会话,我们强制任何再续访问首先都要通过重新登录重新验证。
User space provides a number of access points for reading and managing kernel logging.
用户空间提供了许多读取和管理内核日志的访问方法。
Auditing and logging indicators like requests per amount of time, denials of access, profiling of service consumers, and so on.
对诸如单位时间的请求数、拒绝访问、服务使用者分析等指标进行审核并做日志记录。
The change summary is initially inactive, so the user code needs to access it and set it logging.
更改摘要最初处于非活动状态,因此用户代码需要访问并将其设置开始记录。
Rather than add the latency, complexity, and overhead of summarizing, logging, and processing information, it is often better to provide direct access to live system performance data.
由于不增加延迟、复杂性以及合计、日志及处理信息的开销,提供到即时系统数据的直接访问通常会更好。
This will help a handler obtain access to container-specific value-added features, including authentication mechanisms, transaction processing, a logging framework, etc.
这将帮助处理程序获得特定于容器的增值功能的访问权,包括认证机制,事务处理,日志记录的框架等。
Activity Logging records user activity by person, database, and access protocol.
ActivityLogging记录由个人、数据库和访问协议产生的用户活动。
Listing 3 shows an example of a USER Not Authenticated or FAKED USER error that occurs if you run a program to access a guard point after logging in via a non-authorized login method.
清单3显示了一个USERNotAuthenticated或FAKED USER错误的例子,当您通过不支持的登录方法登录并运行访问保护点的程序之后,就会出现此类错误。
The use of WebSphere logging and caching services and WebSphere Portal access control management also help to simplify administration.
使用WebSphere日志记录和缓存服务以及 WebSpherePortal访问控制管理还有助于简化管理。
Using this special manager allows our application to access the existing WebSphere logging system, adding messages to the main console window and trace logs.
使用这个特殊的管理器可以允许我们的应用程序访问已有的WebSphere日志记录系统,把消息添加到主控制台窗口和跟踪日志。
It is better to take the second option and have other plug-ins access logger.jar through a logging plug-in.
因此使用第二个选项使其他插件通过日志插件来访问logger . jar会更好些。
A user logging into portal can only see and work with those for which portlets the user has the necessary access rights.
登录到门户的用户仅能查看和处理该用户拥有必要访问权限的Portlet的内容。
If a user attempts to directly access a protected page without first logging in (for example, by using a bookmark or following a link), the WebSEAL server will return its default login page.
如果用户试图不是先登录而是直接访问受保护的页面(例如,采用书签或者利用链接),WebSEAL服务器将会返回其默认登录页面。
Overall, make sure that the disk space and access rights in your file system allow for proper WebSphere Process Server logging.
应该确保文件系统中的磁盘空间和访问权限支持WebSphereProcessServer日志记录。
Unless logging is being performed (for example, of exceptions or site access information), WebSphere Portal does not cause any disk access on its own.
除非在执行日志记录功能(例如,在记录异常或站点访问信息),否则WebSpherePortal自己不会引起任何磁盘访问。
Answer: Utility services would be separated into individual subpackages (logging; data synchronization and backup; access control; and login).
回答:公用服务被单独的放在一个子包中(日志服务;数据同步和备份服务;访问控制服务和登陆服务)。
Antipattern: People manually access machines by logging into each of the machines as different users; then they copy files, configure values, and so on.
反模式:由人以不同的用户身份手工登录并访问每台计算机,然后执行复制文件、配置值等操作。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
A requirement of a recovery log is that only one server has access to it (either for recovery processing or standard logging) at any time.
对于恢复日志来说,要求任何时间都只能有一台服务器对其进行访问(恢复处理或是标准的日志记录)。
You are logging in with the correct name and password, but it says that you are not allowed access to the page.
您用正确的用户名和密码登录了,但不允许您访问该页面。
After successfully logging in, the user is sent back to the page they attempted to access in the first place.
成功登录后,用户将被返回到他们第一次尝试访问的页面。
Policy-related requirements, such as security requirements on the users' and external system's access, ID management policies, audit and logging.
政策相关的需求,例如用户访问及外部系统访问的安全性需求,ID管理政策,审计和登录。
If you don't want to log to a database, and would prefer logging only to files, or if you want to log to a MySQL database or an ODBC-accessible database like Microsoft access, choose the first option.
如果您不希望登录到数据库,而是希望仅登录到文件,或者希望登录到MySQL数据库以及MicrosoftAccess等odbc可访问的数据库,则应选择第一个选项。
The following command causes a user logging in from a network access server to have immediate access to EXEC commands.
下面的命令可以使一个用户从网络访问服务器登录,并获得对EXEC命令的立即访问。
Since it is not necessary to have access to the.splogrc configuration file, you can see the Settings of the logging tokens with the help of DB2.GET_SP_CONFIG stored procedure.
由于根本没有必要具有访问.splogrc配置文件的访问权限,因此可以利用DB 2 . GET _ sp _ CONFIG存储过程的帮助来查看日志标记的设置。
The administrator can define the default port, specify the outbound ports for the Access Server, and set the system to automatically connect to the datasources when logging in.
管理员可以定义默认端口,为AccessServer指定离站端口,把系统设置为在登录时自动地连接数据源。
When logging in as a user from that organization, if that user has access to Cognos Administration, only the folders defined in the relevant user database files will be shown.
当作为此组织中的用户登录时,如果此用户有权访问CognosAdministration,那么只会显示相关用户数据库文件中定义的文件夹。
When logging in as a user from that organization, if that user has access to Cognos Administration, only the folders defined in the relevant user database files will be shown.
当作为此组织中的用户登录时,如果此用户有权访问CognosAdministration,那么只会显示相关用户数据库文件中定义的文件夹。
应用推荐