No one can understand the hurt and pain of life, not a time to be able to recover, I can only share memory protection.
NO - 16、无人能明白一生的伤和痛,不是时间能复原的,我只能保护那份记忆。
The PDP-15 was compatible with the earlier PDP-9 and included various advanced features, including memory protection and floating points.
PDP-15兼容早期的 PDP-9并包括各种高级功能,包括内存保护和浮动点。
Even recent memory protection techniques like segmentation, paging, protection keys and simulated segmentation flunks to assure data integrity.
即使是近期的内存保护技术,例如数据分割、分页、保护秘钥和模拟分割都无法确保数据的完整性。
In the 1990s, when Copland was initiated, "next-generation" meant supporting memory protection and preemptive multitasking, both of which classic Mac OS lacked.
Copland始于上世纪90年代,“新一代”是指支持内存保护和抢先式多任务,当时的MacOS不支持这两项功能。
Unfortunately, the memory protection mechanisms of the x86 processors (the most common processors) don't easily support this; normally if a page is readable, it's executable.
遗憾的是,x86处理器(最常见的处理器)的内存保护机制无法容易地支持这点;通常,如果一个内存页是可读的,它就是可执行的。
Vega processors included a custom read barrier instruction that included bit field checking in reference metadata as well as special virtual memory protection for GC-compacted pages.
Vega处理器包含了一个客户化的读屏障指令,它具有字段检查元数据和针对GC压缩页面的特殊的虚拟内存保护。
Furthermore, a Memory Protection Unit (MPU) has been added, which is transparent to existing software but allows new applications to protect specific code or data during execution.
此外,还增加一个存储器保护单元(MPU),该功能虽然对于现有软件是透明的,但新应用软件在执行期间可以保护特定代码或数据。
This mode provides more protection, because the data is mirrored to another node, just in volatile memory instead of the non-volatile disk.
该模式提供更多保护,因为数据被镜像到另一个节点,这仅仅是针对易失性内存,而不是非易失性磁盘。
The test environment used a System i Model 520 with two processors, 32 GB of memory, and 98 disk drives with RAID-5 protection.
这个测试环境??用一台SystemiModel 520,有两个处理器、32GB内存和 98 个磁盘驱动器(带 RAID-5保护)。
The virtual memory area (VMA) pointer needs to be added in as the first parameter followed by the usual four parameters (start, end, size, and protection flags).
虚拟内存区域(VMA)指针要作为第一个参数,然后是四个常用的参数(start,end,size和protection标记)。
This paper is focused on the research of virtual memory technology and space domain protection mechanism in real-time systems.
本文主要研究了实时系统中的虚拟内存技术以及空间域保护机制。
The addressed page is not present in memory, the corresponding page Table entry is null, or a violation of the paging protection mechanism has occurred.
寻址的页不在内存中,对应的页表条目是空的,或者是违背了页式管理的保护机制。
Modern operating systems take advantage of the protection mechanisms implemented by the processor to distinguish various types of memory usage.
现代操作系统利用处理器实现的保护机制来辨别各类内存应用。
History districts, the city vitality as the sediment with the long history river, influence the survival of city's memory, while they are struggling in self protection and revival.
历史街区,这个历经漫长岁月而沉积下来的城市元素,既关系到城市记忆的存亡,又受困于自身的保护与复兴。
Jinan commercial port area for the old buildings, old streets of the Environment Protection and improvement of proposed urban memory of the feasibility of the proposed design elements.
为济南商埠区的老建筑、老街巷的风貌保护和改造,提出以城市记忆为设计要素的可行性建议。
Relatively comes with a low memory footprint for 24 hour background protection.
相对带有一个24小时为背景的保障低内存占用。
Limit protection, overload protection, automatic return, as well as power lost memory intelligent configuration, ensure the safety of the operation of the user.
限位保护、过载保护、自动回位、以及掉电记忆等智能配置,保证用户的操作安全。
We have solved the problem of real-time automatic diagnosis for normal failures in the observation system and the problem of the power failure protection for its data memory chips.
解决了数据存贮器掉电自动保护和观测系统常见故障自动实时诊断问题;
The protection of the memory location is transferred to the memory cloner when a combined response is received at the memory cloner for a particular naked write operation.
当对特定的裸写操作在存储器克隆体接收到组合的响 应时,将存储器位置的保护转移到存储器克隆体。
After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.
在介绍了内存数据库的组织形式之后,本文重点分析了索引HASH算法以及数据完整性和一致性保护。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
The campus is our home, must be our protection, to cherish, enjoy the campus environment, let that pure and fresh bright in years left on the floor of the once beautiful memory.
校园是我们的家,必须由我们来保护,来珍惜,享受校园那清新的环境,让岁月的光辉在曾经的地板上留下美丽的记忆。
Overview of operating system 2. Process management 3. Memory Management 4. Storage management 5. Distributed systems 6. Protection and Security.
作业系统概述2。行程管理3。记忆体管理4。储存体管理5。保护和保密6。分散式系统。
It is able to provide protection for pen drives, USB sticks and memory CARDS.
它能够为笔驱动器,U盘和存储卡提供了保护。
It is able to provide protection for pen drives, USB sticks and memory CARDS.
它能够为笔驱动器,U盘和存储卡提供了保护。
应用推荐