Ensuring instance resource, user, and data request threshold policies are in place.
确保建立实例资源、用户和数据请求阈值策略。
Often, the data request on the current page is based on the response data from previous pages.
通常,当前页面上的数据请求是基于前一个页面中的响应数据的。
After receiving the definition response data, the browser sends the data request to the server.
接收到定义响应数据后,浏览器向服务器发送数据请求。
Without a data request threshold policy, you do not know the size of the queue of data requests.
如果没有数据请求阈值策略,就无法知道数据请求队列的大小。
The source takes the item data request and prepares the actual data to be transferred to the destination.
源接收到项目数据请求,并准备要传输到目标的实际数据。
When a hypervisor is flawed or compromised, all instance resources and data request queues are compromised.
如果虚拟化系统管理程序有缺陷或被攻破了,那么所有实例资源和数据请求队列就都暴露了。
When a process waits for a block device data request to complete, it incurs I/O wait time, and all idle time becomes wait time.
当一个过程等待一个块设备数据请求完成时,它会增加 I/O等待时间,而所有空闲都会变成等待时间。
Data request threshold policy to ensure data requests to the applications sent by users concurrently can be processed immediately.
数据请求阀值策略,以确保用户并发向应用程序发送的数据请求,可以被立即处理。
Data request threshold policy: Ensures data requests to the application can be processed immediately below or at the threshold level.
数据请求阀值策略:确保所有向应用程序发送的、低于或等于阀值水平的数据请求都可以被立即处理。
Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.
接下来,使用者希望了解SaaS、PaaS和IaaS用户、资源和数据请求安全策略的安全关注重点是什么。
You can either develop each policy type individually or combine all three policy types - resource, user, data request - into one threshold policy.
您可以分别开发每个策略类型,或者将三个策略类型—资源、用户、数据请求—结合为一个阀值策略。
For the buffer processing, the MFC treats a zero-size data request as a no-op, so I can go ahead and issue requests even if there is no data to read.
对于缓冲区处理,MFC 将大小为零的数据请求当作无操作来对待,所以即使没有数据可读取了,也可以继续发出请求。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
When the client receives a context response, start response, or data from the Web service, it processes the message and then makes a data request call to request more data.
当客户机收到上下文响应、启动响应或来自Web服务的数据后,客户机将处理消息,然后发出数据请求调用以请求获得更多数据。
This paper puts forward the generation model of statistics accounting information in ERP system by analyzing the data request of China's enterprise statistics accounting.
通过对我国企业统计核算数据要求的分析,提出了ERP系统中的统计核算信息生成模型。
On the negative side, the container's response to load conditions and data request patterns is unpredictable, so extensive scenario-based load testing must be added to the development process.
从消极的方面看,容器对装入条件和数据请求模式的响应是不可预知的,所以必须在开发过程中添加大量的基于方案的装入测试。
Data request threshold policy: the provider sets data request threshold levels below the maximum number of data requests and the maximum size of data requests that users can send concurrently.
数据请求阀值策略:供应商将数据请求阀值水平,设置为低于数据请求的最大数量,以及用户可并发发送的数据请求的最大大小。
Each request carries some data over the network; if the request does not find any updates on the server, this data transfer is a waste.
每一次请求都要在网络上传输一些数据;如果请求未在服务器上发现任何更新,那么这个数据传输就是浪费的。
Once you have an active and valid session, you can request data from the agent directly for one or more OIDs.
一旦拥有了活动和有效的会话,您就可以直接从代理请求一个或多个OID的数据。
On the top of that, each request carries some data over the network; if the request does not find any updates on the server, this data transfer is a waste.
除此之外,每一次请求都要在网络上传输一些数据,如果请求未在服务器上发现任何更新,那么这样的数据传输就是浪费资源。
Enter some values in the request URI or data content.
在请求uri或者数据内容中输入一些值。
It is very RESTfully designed, so you can use any code that can request data from a URL.
它是基于REST风格设计的,所以您可以使用任何用来从URL请求数据的代码。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
If some of the request data is transferred in the SOAP header part of the request message, you can call this an explicit header.
如果这些请求数据在该请求消息的SOAP消息头部分中传送,那么用户就可以调用这个显式消息头。
These tools collect much information to help you determine whether your system is in good performance shape, including data on request response times, processor utilization, and more.
这些工具将收集大量信息,以帮助确定系统是否具有良好的性能设计,其中包括关于请求响应时间、处理器使用率等的数据。
The framework automatically transfers data and data conversion from request parameters, but where does the data go and how does OGNL figure out the target?
尽管此框架自动传输数据并转换来自请求参数的数据,但数据将前往何方,OGNL如何确定目标呢?
The previous articles showed techniques for defining the input request data and verifying the expected notification requests.
前两篇文章介绍了定义输入请求数据和验证预期通知请求的一些技术。
This allows the receiving node to validate its incoming data and request retransmission when an error is found.
这支持接收节点验证输入数据,并在发现一个错误时请求重发数据。
Such scenarios expose the need for a more sophisticated scheme, than simply keeping and checking the most recent request data.
此类场景表明需要使用更完善的方案,而不只是保存和检查最近的请求数据。
Pull technology is when the handheld device initiates the communication using its gateway to request data.
拉技术是在手持设备使用其网关发出通信以请求数据时。
应用推荐