Chinese officials say the expansion in Antarctica prioritises scientific research. But they also acknowledge that concerns about "resource security" influence their moves.
中国官员说,在南极洲的拓展以科学研究为重点。但他们也承认,对“资源安全”的担忧限制了行动。
Chinese officials say the expansion in Antarctica prioritises scientific research, but they also acknowledge that concerns about "resource security" influence their moves.
中国官员表示,在南极的扩张优先考虑科学研究,但他们也承认,对“资源安全”的担忧影响了他们的行动。
Command resource security provides a secondary level of checking for commands.
命令资源安全性为命令提供了一个辅助检查级别。
These factors present a threat to Russia's economy and energy resource security.
这些因素已对俄罗斯经济和能源安全构成威胁。
When the QALIAS is defined, there is no resource security check for the target of the alias.
一旦定义QALIAS,就不会对别名的目标进行任何资源安全性检查。
The paper narrates theories of that, and details the technique on headend and resource security.
详细描述了头端和资源保护两个方面的研究。
Mineral security is an important component of national economical security and resource security.
矿产安全是国家经济安全及资源安全的重要组成部分。
Since users can be members of any number of groups, it is simple to create new groups to handle resource security.
由于用户可以同时是多个组的成员,所以只需要创建新的组就可以安全使用资源。
National resource security is based on the integration of regional resource securities within the same country.
国家资源安全须建立在地区间合理分工与协作的基础之上,是对地区资源安全的整合。
You can define command resource security profiles for application resources, such as application queues, to control which users can define which queues.
可以为应用程序资源(比如应用程序队列)定义命令资源安全性配置文件,以控制哪些用户能定义哪些队列。
In this paper, we define sustainable developing oil and gas resource security system, and set up its evaluation model and evaluation index system.
研究一种用于油气管道安全分布式光纤预警系统的侵入事件识别方法。
Use command resource security to ensure that only the queue manager's administrators can modify SYSTEM resources of any kind, such as queues and channels.
使用命令资源安全性确保只有队列管理器的管理员能够修改任何种类的SYSTEM资源,如队列和通道。
From social, economic and natural aspects, the East, the Middle and the West of China should undertake different functions in national resource security.
我国东、中、西三大地带的资源赋存状况和社会经济条件差异显著,在保障国家资源安全方面承担的职能也应有所区别。
You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.
为此,可以限制对可能会影响它们的命令的访问,或者,也可以通过命令资源安全性提供保护。
Additionally, the MQADMIN class profiles contain the string QUEUE for profiles used for command resource security, or CONTEXT, for the profiles used to control access to message CONTEXT.
此外,mqadmin类概要文件包含针对用于资源安全性命令的概要文件的字符串QUEUE,或者用于控制对消息CONTEXT的访问的概要文件的字符串CONTEXT。
The article discusses the concept of cultivated land resource security and classification of protectors firstly, then analyses protectors' behavior tendency and their game relation.
文章从耕地资源安全的概念和保障主体分类入手,分析了各保障主体的行为倾向和博弈关系。
But even if you will permit only the MQ administrators to define queues, command resource security profiles can still be useful as a means to, at least partially, enforce naming standards.
但是,即使您只允许MQ管理员定义队列,命令资源安全性配置文件仍然能够(至少部分)用作一种实施命名标准的方式。
If in addition to the backstop profile, you define SYSTEM and application profiles, then only resources (such as queues) that match those command resource security profiles can be defined.
如果除backstop配置文件外,还定义了SYSTEM和应用程序配置文件,那么只能定义匹配那些命令资源安全性配置文件的资源(比如队列)。
Then additional profiles in the MQADMIN class control command resource security, that is, the authority to define queues that have a specific name, for example any queues that begin with APP1.
mqadmin类中的其他概要文件控制命令资源的安全性,即定义具有特定名称的队列的权限,例如任何以app 1开头的队列。
Yet this enormous resource is not contributing enough to today's global challenges, including climate change, security, sustainable development and health.
然而,这一庞大的资源尚未对应对当今全球性挑战做出足够的贡献,例如气候变化、安全问题、可持续发展和健康问题等。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (Figure 1).
这些系统契约定义资源适配器为事务管理、连接管理和安全提供的服务质量(图1)。
This setup has a number of advantages, such as detailed resource management and security.
该设置具有大量优势,比如详细的资源管理和安全性。
It provides powerful and flexible transaction support, and handles security, data integrity, and resource scheduling.
它提供强大且灵活的事务支持,可以处理安全、数据完整和资源调度。
These system contracts define the qualities of service that a resource adapter provides for transaction management, connection management, and security (see Figure 1).
这些系统契约定义了资源适配器为事务管理、连接管理及安全提供的服务的质量(参见图1)。
Another area where you might want to improve the security and environment of your script is to use resource limits.
可能希望改进脚本的安全性和环境的另一个领域是使用资源限制。
Address major technical risks, such as resource contention risks, performance risks, and data security risks, by implementing and validating actual code.
通过实现和验证实际的代码,处理主要的技术任务,比如资源争夺风险、性能风险和数据安全风险。
The resource manager implements the object pool and it gets the managed resource that implements persistence, security state management, and transaction.
资源管理器实现了对象池,它能够获得实现持久化、安全性状态管理和事务的托管资源模式。
The resource manager implements the object pool and it gets the managed resource that implements persistence, security state management, and transaction.
资源管理器实现了对象池,它能够获得实现持久化、安全性状态管理和事务的托管资源模式。
应用推荐