从二进制文件安装和配置php。
二进制文件安装或从源代码编译。
在撰写本文时,库中至少缺少一个二进制文件。
At the time of this writing, at least one binary is missing from the repository.
下一步是下载CDT二进制文件。
把“ihx”文件转化成二进制文件。
包含必要更新的二进制文件(可选)。
有其他选项可用于指定所需的二进制文件。
There are other options for specifying the required binaries.
符号表存储了二进制文件中所有符号(函数)的细节。
The symbol table stores the details of all the symbols (functions) in the binary.
安装您自己编译的samba二进制文件。
然后使用export命令检索二进制文件。
版本6不支持初始的缺省配置和产品二进制文件目录混合。
Version 6 does not support an initial default configuration mixed in with the product binary directories.
最后一列是进程的描述,通常是所运行的二进制文件的名称。
The final column is a description of the process, usually the name of the binary that was launched.
我的编程器软件现在只能识别从地址0开始的原始二进制文件。
My programmer software now understands only the raw binary files starting from address 0.
要获取有关二进制文件的完整信息,则需要执行以上这些步骤。
The above steps need to be carried out for retrieving the full information about a binary file.
下载最新PHP版本的windows二进制文件。
Download the Windows binaries for the latest version of PHP.
将二进制文件,库文件和头文件放在一致的逻辑位置。
Place binaries, libraries and header files in a logical and consistent location.
示例程序的二进制文件提供在示例包中(参见下载)。
Binaries for the sample programs are provided in the samples pack (see Downloads).
在使用二进制文件进行部署时,存在一些条件和限制。
When deploying using binaries, certain conditions and restrictions are needed.
问题:outsidein二进制文件没有执行权限。
我们会在配置所部署的环境期间使用到这些二进制文件。
We use these binaries during the configuration of the deployed environment.
您不会希望图像的二进制文件存储在每一个资源文件中!
You wouldn't want the image binaries to reside in every resource file!
也许还需要配置跨编译器以生成想要测试的二进制文件。
You may also need to configure a cross-compiler to generate the binaries you intend to test.
压缩二进制文件可以使等待时间最短,因而符合项目需求。
Compressing the binaries yields the shortest possible wait times, thus meeting the requirements of the project.
因此,检查调试信息可以确保二进制文件与源文件是同步的。
Hence, simply checking the debug information can ensure that the binaries are in sync with the source.
用户可以选择为使用二进制文件部署的存储过程修改这些字段。
The user can choose to modify these fields for the stored procedure being deployed using binaries.
认证方法的选择对存储和检索二进制文件所需的时间影响不大。
The choice of authentication method does not much affect the time required to store and retrieve binaries.
使用二进制文件进行部署时,不会将源代码也传送到目标服务器。
Deploying using binaries will not transfer the source code to the target server.
在将产品投入生产之后,就会从二进制文件中删除所有调试信息。
Binaries are stripped of all debugging information when a product goes to production.
配置或者db2二进制文件受损、损坏、或者被删除,可能导致实例不可用。
An instance may become unavailable due to configuration or DB2 binary files being compromised, corrupted, or deleted.
配置或者db2二进制文件受损、损坏、或者被删除,可能导致实例不可用。
An instance may become unavailable due to configuration or DB2 binary files being compromised, corrupted, or deleted.
应用推荐