In paravirtualization, the control program implements a hypervisor application program interface (API) that is used by the guest operating system.
在半虚拟化中,控制程序实现了管理程序的应用程序接口(API),它将由来宾操作系统使用。
A virtual machine is one operating system (OS) that is being managed by an underlying control program allowing it to appear to be multiple operating systems.
虚拟机是一个由底层控制程序管理的操作系统(OS),这让它看起来像多个操作系统。
The operating system manages AME, and it is configurable on a per LPAR basis by the virtualization control point.
操作系统管理ame,虚拟化控制点可以按单个LPAR为基础配置ame。
TAMOS is implemented as a series of daemons, kernel extensions, and control files for either the UNIX or Linux operating system.
TAMOS是作为一系列UNIX或Linux操作系统的后台进程、内核扩展以及控制文件实现的。
At its core is the Control Program (CP), which provides the virtualization of physical resources to the guest operating systems, including Linux (see Figure 5).
其核心是ControlProgram (CP),它为客户操作系统,包括Linux,提供了物理资源的虚拟化(参见图5)。
This is very handy since many of the files used to control and configure Linux are human readable (as opposed to the legacy operating systems).
这是一个很有用的工具,因为很多控制和配置Linux系统的文件都是文本可读文件(这一点,跟传统的操作系统有区别)。
In some cases, the guest operating system is targeted to the same CPU as the control program, but other cases may be different (for example, a PowerPC guest running on x86 hardware).
在某些情况下,来宾操作系统与控制程序使用相同的CPU,而在另外一些情况下,则可能不同(比如PowerPC来宾操作系统在x86硬件上运行)。
One other key concept is that it’s the data that provides what John Battelle and I are calling “points of control” in the future Internet operating system.
另一个关键理念则是John Battelle和我所说的,数据将在未来的互联网操作系统中所提供的“控制点”(pointsofcontrol)。
The user is still not allowed to control the operating system, hardware, or network infrastructure.
这个用户仍然不允许控制操作系统、硬件或网络基础架构。
It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.
对于云交付模型,使用者对部署的应用程序、操作系统、硬件、软件、存储和网络的控制能力不同,这会影响云安全策略。
Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.
自主访问控制机制是安全操作系统必不可少的、应用最广泛的安全机制之一。
The VMRUN instruction allows a virtual machine (and its associated guest operating system) to run until the VMM regains control (which is also configurable).
VMRUN指令允许虚拟机(及其相关的客户操作系统)一直运行,直到VMM重新获得控制权为止(这也是可配置的)。
But owing to addition of ice storage device to air conditioning system, the system flow intricacy degree is increased and put higher claim to operating project and control system.
但是由于冰蓄冷空调系统中加入了关键设备——蓄冰装置,系统流程复杂程度增大,对运行控制方案和控制系统提出了更高的要求。
Whether the security of operating system is determining directly safety of information, thus the control for in system resource use and file system safe become more and more important.
操作系统的安全与否直接决定着信息是否安全,因而系统在文件系统安全方面和在系统资源使用方面的控制就变得越来越重要。
Voltage control the voltage control is a rheostat that sets the operating point of the voltage regulator and therefore controls the output voltage of the generator set, within its design limits.
电压控制电压控制是设定电压调整器的运行点从而在设计范围内控制发电机组的输出电压的变阻器。
Fighting these music rights organizations is also clearly a sign that Google is trying to keep the costs of operating YouTube under control.
与这些音乐版权组织的对抗也显示了这样一个迹象:Google想将Youtube的运营成本保持在一个可控的水平内。
Of course the underlying operating system might decide to speculatively read data when the file is opened, to save time later, but that's outside your control so in effect it doesn't matter.
当然,底层操作系统可能会随机读取数据的文件被打开时,为了节省时间,但那是你控制之外的所以实际上没关系。
Operating principle of power factor compensating device for 8k electric locomotive is briefly described as well as its parameter selection, switching on and off control.
本文概述了8K机车功率因数补偿装置的工作原理、参数选择及投切控制。
Experience as a petroleum or chemical process operator in all the operating units controlled by the central control room is required for chief operators.
首席运营商必需具备在由中央控制室控制的所有的运营单位担任石油或化学工艺运营商的经验。
The business is organized into three operating units: Components and Packaged Applications, Automation Control and Information Group and Global Manufacturing Solutions.
这方面业务分成三个运营单位:零部件和成套应用、自动控制和信息集团,还有全球制造解决方案。
Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.
即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。
T-S fuzzy control system based on asymptotic tracking control is designed for a MIMO nonlinear boiler-turbine system whose parameters vary under the operating condition within wide range.
针对多输入多输出非线性锅炉-汽机系统在大范围运行工况下参数发生变化的情况,设计了基于渐近跟踪控制的T - S模糊控制系统。
The actual operating results show that this design is feasible, the control performance and reliability of electrical equipment are improved.
实际运行结果表明,这种设计是可行的,提高了电气设备控制性能及可靠性。
Enterprise risk management audit is not only enterprises operating objectives, and which is to strengthen the internal control of the effective means.
企业风险管理审计不仅是企业实现经营目标的保证,而且是强化内部控制的有效手段。
The result is an organization that is operating in a known state-of-control for the device design, process design, manufacturing processes, and records.
其结果是一个组织能够以所谓“受控状态”运行其医疗器械设计,工艺设计,生产流程及记录。
Carry on quality control in purchasing large port machinery equipments is concerned in the operating effect and use safety of the equipments.
对大型港机设备在选购过程中实施质量控制,关系到设备投入运营后的效果及使用安全。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
应用推荐