Running the above command produces an XML document that contains configuration or status of an "update" or "create" request for portal resources.
运行上述命令产生一个XML文档,该文档包含对门户资源的“更新”或“创建”请求的配置或状态。
Each request sequence was run multiple times in different security configurations with only the best time for each configuration kept in the results.
每个请求序列都使用不同的安全配置运行了多次,结果中仅记录各配置表现最好的数据。
These optimize your PHP configuration and code to prevent unneeded file status checks on every request, which can slow down response times.
这些函数优化您的PHP配置和代码,以防止对每个请求进行不必要的文件状态检查,从而减少响应时间。
Each request sequence was run multiple times in different security configurations, with only the best time for each configuration kept in the results.
每个请求序列都在不同的安全性配置下运行了多次,每种配置只取最好的测试结果。
Listing 5 below shows a sample SOMA request to add configuration for a new partner.
下面的清单5展示了一个为新合作伙伴添加配置的样例soma请求。
After supplying the required configuration parameters, click OK to submit the service request.
在输入必要的配置参数之后,单击OK提交服务请求。
Would it be feasible to deploy the connector with the configuration data, so you could request the file from the application server instead of opening the file directly?
即使用配置数据来部署连接器的方法可行,也可以从应用服务器请求文件,而不是直接打开文件。
Service definition also allows for configuration of a service throughput through specifying (on a transport basis) the number of threads dedicated to the processing of the service request.
服务定义中也可以通过指定(在传输上)处理服务请求的线程数来配置服务的吞吐量。
A single SOMA request can contain only one of these two request types, but each can set or modify multiple configuration objects.
一个单个soma请求只能包含这两种类型请求的其中之一,但是每一个请求类型都可以设置或修改多个配置对象。
For each dispatcher registered in the target system, the configuration and activity will be logged, saving information such as time taken to connect, number of active processes and request duration.
对于在目标系统内注册的每个调度程序,相应的配置及动作都将被记录,诸如连接花费的时间、活动过程的数量和请求持续时间等信息会被保存。
With this configuration, the node will wait for a connection to be established by another output or request node.
在这种配置下,节点将等待另外的输出或请求节点建立连接。
The configuration of these request parameter injections are nested within the page action XML declaration.
这些请求参数注入的配置嵌套在页面动作XML声明中。
When CAM receives a request to authenticate the first decision about the type of authentication is made based on configuration.
当CAM收到要执行身份验证的请求时,首先根据配置决定身份验证类型。
Starting at the beginning of a request, the request will get some security information attached to it in the form of a subject created by a login configuration containing several JAAS login modules.
首先研究请求的开始阶段,请求将附带一些安全信息,这些信息的形式是包含若干JAAS登录模块的登录配置所创建的主题。
The target server receives the incoming request and starts invoking the login modules from the RMI_INBOUND login configuration.
目标服务器接收传入的请求,并开始调用 RMI_INBOUND登录配置中的登录模块。
The target server invokes the login modules from the RMI_INBOUND login configuration to pick up the credentials from the incoming request.
目标服务器调用rmi_inbound登录配置中的登录模块,以便从传入的请求获得凭据。
When all updates are complete, return the default PXE boot configuration to boot from local disk to avoid any accidents if a computer were to make a PXE request.
更新完成后,把默认PXE启动配置改为从本地磁盘启动,防止计算机再次发出PXE请求时发生意外。
You see the header configuration, composed of key-value pairs that dictate the configuration of the individual request.
可以看到头配置由表示每个请求的配置的键-值对组成。
The first is used to read the XML configuration file; the second is used to print the object that is received after de-marshaling the SOAP request.
第一个用于读取XML配置文件;第二个用于打印解组SOAP请求后收到的对象。
No additional configuration is required; the framework knows to call these methods when an HTTP GET request is received on the corresponding URL.
无需其他配置;当相应的URL接收到HTTPGET请求时,框架会调用这些方法。
Each of the above configuration files includes the following Request processor.
以上的每一个配置文件都包含下列请求处理器(Request Processor)。
If the WS-Inspection option is used, the demos request a WS-Inspection document from the Web server configured using the toolkit configuration utility.
如果用WS -Inspection选项,那么演示就用工具包配置实用程序从配置的Web服务器请求一个WS - Inspection文档。
Upon request to deploy, this configuration file is passed to the PERL script (w4glc) to deploy the given 4gl function as a Web service.
在请求执行部署时,把这个配置文件传递给perl脚本(w4glc),从而把指定的4gl函数部署为Web服务。
Click Browse to select a request data binding configuration.
单击browse以选择请求数据绑定配置。
The client domain gateway expects a request message with an LTPA token in a Web services security (WS-Security) header as generated by the configuration described in Part 4 of this series.
客户端域网关期望Web服务安全(WS 安全)标头中具有LTPA令牌的请求消息(该标头由本系列文章的 第 4部分描述的配置生成)。
WebSEAL will receive a URL request from the client and, based on the junction configuration, will issue a request to the server.
WebSEAL接收来自客户机的一个URL请求,并且基于联结配置,将会向服务器发出一个请求。
Each request sequence was run multiple times in different security configurations, with only the best time for each configuration kept in the results. The security configurations tested were.
每个请求序列在不同安全配置下运行多次,结果取每种配置下的最好成绩。
Based on the configuration and load-balancing pattern of the load Balancer, the request will be rewritten and passed to Server1 or Server 2 or Server 3.
基于配置和负载均衡器的负载均衡模式,请求被重写或传递到Server 1或Server2或Server3。
The Web server directs the request to Ruby on Rails based on the domain configuration.
Web服务器根据域的配置把请求转给Rubyon Rails。
The default way to specify the username and password to be used in the service request is in the client side deployment descriptor as part of the configuration of UsernameToken security.
指定在服务请求中使用的用户名和密码的缺省方法位于作为UsernameToken安全配置一部分的客户端部署描述符中。
应用推荐