BRMS implementation example 1.
BRMS实现示例1。
Example 1: Injections attacks.
示例1注入攻击。
集群设置示例1。
Listing 6. Output from example 1.
清单6。
Example 1: Removing or hiding fields.
示例1:删除或隐藏字段。
示例1:word1word2。
Example 1: Problem Solving Co-Worker issues.
例1:同事之间问题的解决。
Example 1: Using pluglets to test your plugins.
例1:使用pluglet来测试您的插件程序(plugin)。
Example 1 - Historical Rates with only two roll ups.
示例1—只有两个汇总(roll ups)的历史汇率。
Example 1: in one project, we needed help in system-level testing.
实例1:在一个项目中,我们在系统级测试上需要帮助。
Error detection example 1: Rational Purify memory error and memory leak reports.
错误检测实例1:RationalPurify内存错误和内存泄露报告。
Follow the same steps as in Example 1 to generate the access plan for the query below
按照和例1同样的步骤生成查询的访问计划
The geometric meaning for the parametric equation of ellipse is a familiar thing (See example 1).
椭圆的参数方程的几何意义是众所周知的(见例1)。
Figure 3 shows a conceptual view of the base tables for the address relationship described in Example 1.
图3显示了示例1中描述的地址关系的基础表的概念视图。
SQL1042 example 1: Permission problems causing SQL1042 during installation of JAR file. Relevant db2diag.log.
SQL 1042示例1:在安装JAR文件期间造成SQL 1042的权限问题。
This example builds on example 1, so perform the steps in example 1 before proceeding with the following steps.
这个例子以例1为基础,所以在进行后面的步骤之前,先执行例1中的步骤。
This example USES the same environment, database, and database manager configuration Settings as example 1 above.
这个例子使用和例1同样的环境、数据库和数据库管理程序配置。
In example 1, the syntax calls the sequence diagram called Retrieve Borrower Credit Report and passes it the parameter SSN.
在例子1中,语法调用叫做RetrieveBorrowerCreditReport的序列图,传递给它参数ssn。
Suppose during the busiest time of the day, there are 200 applications connecting to the database described in Example 1.
假设在一天中最忙的时间里,有200个应用程序连接到例1中所描述的数据库上。
Example 1 in this article, the EJB client example, removes duplicate WSDLs that have already been loaded into the repository.
本文中的示例1 (EJB客户端示例)移除已经加载到存储库中的重复WSDL。
Example 1 is a basic Ajax-enabled page that allows users to post comments to an article received from an external location.
示例1是一个很基本的、启用了Ajax的页面,它允许用户评论从外部接收的文章。
An example of such a "readability" order is mentioned in shop standard example 1 (code join predicates before local predicates).
这样的“可读性”顺序的一个例子已经在前面的实践标准1(联接谓词先于本地谓词)中提到。
The database manager configuration, database configuration and db2set registry variables are the same as in Example 1 above.
数据库管理器配置、数据库配置和db2set注册表变量与上面示例1中的相同。
Modify the files so that you are connecting to the dummy database instead of sample as we did previously in Example 1 above.
修改这些文件以使您连接dummy数据库,而非之前在上面示例1中所连接的sample数据库。
You'll need these settings to compile both examples, and for the runtime environment where you execute the EJB client for Example 1.
您需要使用这些设置来编译这两个示例,并使用这些设置获得执行示例1的EJB客户端的运行时环境。
Example 2 builds upon Example 1 but includes how to provide a custom user registry to deal with the various formats for openid_urls.
示例2是在示例1上构建的,并提供了一个定制的用户注册表来处理各种openid_urls格式。
Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.
考虑示例1 (a),当然,这改写自Windows攻击,它构成了此类攻击载体的基础。
The servers in Example 1 will consist of two clusters (LocalCluster and RemoteCluster), each containing a single node and cluster member.
示例1中的服务器由两个集群(LocalCluster和RemoteCluster)组成,每个集群包含单一节点和集群成员。
If two prefixes reference the same URI, the namespace of the prefixed elements will be the same (see example 1 in Listing 5 for an example of this).
如果两个前缀引用相同的URI,那么被加上前缀的元素的名称空间将是相同的(请参见清单5中的示例1)。
As this example demonstrates, the new partitioning key causes minimal data skew and is a much better choice than the original S_NATIONAL key from example 1.
正如这个示例所展示的,新的分区键带来了极少的数据倾斜,因此比示例1中的原始s_national键好很多。
应用推荐