This will let you format the same data in different ways and then access it directly.
这种方法允许您以不同的方式对相同的数据进行格式化,然后直接访问它。
He allegedly used that illegal access to tap into a wire, hack into MIT's network, and then access Jstor's library.
依其申述,他采用这种非法方式进入一根电线,私自存取mit的网络,然后访问了Jstor图书馆。
You can save documents, web clippings, audio files, pictures and of course text notes and then access them from Evernote on any device.
你可以保存文档、网页剪辑、音频文件、图片,当然还有文本笔记,然后你可以从任何一个设备上的Evernote进行同步访问。
Do I first get nearest Google places from the current location and then access the database for bike location and make markers on the map?
我先把谷歌从当前位置最近的地方然后进入自行车位置数据库和地图上做标记?
A user can deposit a check using the check reader on the machine and then access the money via the mobile app to pay bills or transfer money.
用户可以使用手机上的支票阅读器存入支票,然后通过移动应用程序来支付账单或转账。
Applications connect to one of the messaging engines implemented using depicted in the article patterns, and then access the group's properties.
应用程序连接到使用文中介绍的模式所实现的消息引擎之一,然后访问组属性。
Because the Twitter data is an array of objects, it makes sense to parse the entire string into an array and then access the object individually by ordinal position.
因为Twitter数据是一个对象数组,整体解析成一个数组然后按顺序逐个访问对象是明智的选择。
You can define template variables within the View through the setAttribute() method, and then access the variables within the template itself as keys of the $t array.
您可以通过setAttribute()方法在视图内部定义模板变量,然后在模板内部以 $t 数组的键的形式访问这些变量。
I was lucky to be at the technology conference then, and I had access to 3D printers.
当时我很幸运能参加技术会议,而且我可以使用3D 打印机。
You need to get special permission to access them, and then you have to wear gloves to handle them because the oils in our hands can destroy the paper.
你需要得到特别许可才能接触它们,处理的时候还必须戴上手套,因为我们手上的油会毁了纸。
So far, you learned how to create metadata, then populate and access a data graph corresponding to the metadata.
到目前为止,您已经了解了如何创建元数据,然后填充和访问与元数据对应的数据图。
It all starts with the ability to recognize information of value and then organize that information for storage, access, and ultimately presentation to a specific audience.
这一切全都从识别有价值的信息的能力开始,然后组织该信息以便存储、访问并最终向特定的受众进行展示。
If a user tries to access a protected column that their LBAC credentials do not allow them to access, then the access will fail and they will get an error message.
如果一个用户试图访问一个受保护的列,而他们的LBAC凭证又不允许他们访问该列,那么这样的访问将失败,用户收到一条错误消息。
Anyone can scan a barcode on an item at a store and then automatically access any eBay listings of the product on the marketplace.
任何人只要扫描一家商店某商品的条形码,然后就可以在市场上自动获取该商品的任何易趣产品。
Authenticated and authorized users can then access a protected resource without performing the login procedure repeatedly.
然后,经过身份验证和授权的用户可以访问一个受保护资源,无需重复执行登录过程。
If the number of consuming services increases then both data volumes and concurrent data access patterns may be significantly different from the initial situation.
如果使用服务的数量增加,则数据量和并发数据访问模式可能会与最初投入使用时的情况大为不同。
These services require you to access and query them, and then parse results in non-standard ways.
这些服务需要您进行访问和查询,随后以非标准化的方式解析结果。
We'll get started with some sample code and then jump right into how you access generic information at run time.
我们首先使用一些示例代码,然后直接讨论如何在运行时访问泛型信息。
The best way to do that is to keep the cost of entry low, perhaps by subsidizing or giving away equipment the user needs to connect and then charging little for access and use.
达成这个目标的最优方法是尽量降低接入门槛,比如可以补贴甚至免费赠送网络接入设备,然后再收取很少的接入和使用费用。
A hacker could perform a memory dump at the right time and then gain access to this sensitive data.
黑客则会在适当的时刻,将内存中的信息转储出来,进而成功地访问这些敏感数据。
Using its own policies, the client is then able to mount and access the appropriate location for the file system it requested.
客户机运用自己的策略可以挂载并访问它请求的文件系统的适当位置。
Few people back then had cell phones, and almost no one had access to the Internet.
那时,极少有人拥有手机,几乎没有人使用因特网。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
"If all countries agree on a common approach, and stop commercial exploitation, then access will be more equitable and we will have fewer health tragedies."
“如果所有国家能商定共同做法,并禁止谋取商业利益,那么获得移植的机会将会更加公平,并且将会减少卫生悲剧的发生。”
The main thing about Evernote is that all of your notes are automatically sent into the cloud–and then you can access them from any web-connected computer via the Evernote app or a web browser.
Evernote 最主要的功能是:你所做的笔记都会被自动发送到云储存平台上,然后你可以在任意一台连接网络的电脑上,通过Evernote软件或网页浏览器来获得它们。
You can start DB-Access in Menu mode and then select options from menus, or you can invoke DB-Access from the command line.
您可以在Menu模式下启动 DB-Access,然后从菜单选择选项,或者从命令行调用 DB-Access。
You can include email, documents, chats, Web links, and more in an activity and then give access to other people to allow them to see the current status of the activity.
可以在一个活动中包括电子邮件、文档、聊天、Web链接等,并将访问权提供给其他人,使他们可以看到该项活动的当前状态。
OAuth requires that Service Providers first authenticate the User, and then ask them to grant access to the Consumer.
OAuth要求服务提供者首先认证用户,认证完成之后要求用户批准消费者的访问。
The only username and password I have to remember is for Evernote, and then I've got one-click access to all my logins.
我只记了Evernote的用户名密码,然后我就能一键访问我所有的登录信息。
Typically, you will only install one agent manager, and then one agent on each machine you want to access remotely.
通常,您只需要安装一个代理管理器,然后在每台要远程访问的计算机上安装一个代理。
应用推荐