必须拒绝所有来自媒体的访问请求。
我们将在30天内响应所有的访问请求。
租户的访问请求应该路由或分派到对应的过程模板或实例。
The access requests of a certain tenant should be routed or dispatched to its corresponding process templates or instances.
此部分描述如何在wi中加载应用程序,以及批准用户访问请求的持续工作。
This section describes getting the applications set up within wi and the ongoing function of approving user requests for access.
结合确定性推理和可能性推理,描述了如何判定访问请求的算法。
Based on certainty and possibility reasoning, an algorithm to determine whether an access request is authorized is proposed.
IXAND访问请求元素要求优化器使用indexanding访问表。
The IXAND access request element directs the optimizer to use index anding to access a table.
假设成功认证用户或组,事务授权将检查用户或组是否被授权访问请求的事务。
Assuming that the user or group is successfully authenticated, transaction authorization checks whether the user or group is granted access to the transaction that is being requested.
JPA应用程序在第一个访问请求和后续修改请求之间并没有保持分离对象的引用。
The JPA application holds no reference to the detached objects between the first access request and the subsequent change request.
当主机要访问SAN存储设备,它发送一个基于块的存储设备的访问请求。
When a host wants to access a storage device on the SAN, it sends out a block-based access request for the storage device.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
The other technology LDAP can provide a secure model to control access requirement according to identity information.
在TCPPorttolistenon字段中,输入服务为获得访问请求而侦听的TCP端口。
In the TCP port to listen on field, enter the TCP port that the service is listening on for access requests.
谷歌一下“信息过量”,立马就过量的信息映入你的眼帘:0.05秒内就有超过7百万次访问请求。
GOOGLE "information overload" and you are immediately overloaded with information: more than 7m hits in 0.05 seconds.
为了说明XACML的不同组件,我们将以一个具体的访问请求为例,创建所需的全部 XACML 组件。
To illustrate the various XACML components, I'll show you how to take a specific access request and create all the XACML components required to process it.
网关认证主要用于认证从本地网络访问外部网络的用户,这要求所有的网络访问请求必须穿过网关系统。
Gateway authentication is mainly used to authenticate users who get access to external network from a local network. In this case, all of network access requests must go through a gateway system.
需要访问数据库的进程将数据库访问请求放入队列中,由另一个数据库访问模块进行实际的读取数据操作。
Need access to the database will process database requests for visits Add to queue from another database access module to carry out the actual data read operation.
高效的视频服务器,要求能在有限的系统资源下,最大化地服务于访问请求的同时,能够提供更加可靠的服务。
Highly efficient video server refers to the one that can maximize the service to request on the condition of limited system resources, and at the same time, can provide more reliable services.
一般来说,如果两个或多个用户以写模式并发访问文件,第一个用户保证能以写模式访问文件,其他用户的写模式访问请求将排队。
In general, if two or more users access the file in write mode concurrently, the first user is granted write mode access to the file and the remaining users write mode access requests are queued.
该解决方案通过建立统一的数据模型,使用元数据与多数据库系统实现了对分布的异构的空间数据的统一访问请求服务。
Based on the unified data modeling, this resolution realizes the uniform request service to distributed heterogeneous spatial data by metadata and multi-database system.
模型中需要通过决策检测器对新的请求进行决策,以决定是否允许执行访问请求,这样做的目的就是来准确地区分合法请求和非法请求。
The model use the model detector decision-making the new request to decide whether to allow the access request, this goal is to accurately distinguish between legitimate requests and illegal requests.
要想动态地配置CXF,需要使用这个隐含的类型并把代理转换为bindingprovider类,然后通过类型转换访问请求上下文属性映射。
To configure CXF dynamically, you need to make use of this implied typing and cast the proxy to the BindingProvider class, then access the request context property map through that cast.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
由于它们因特网网关的带宽限制,美国陆海空三军最近开始阻塞来自它们内部网络的,对例如YouTube和MySpace之类视频服务器地访问请求。
America's armed forces recently began blocking access to video services such as YouTube and MySpace from their internal networks, because of bandwidth limitations at their Internet gateway.
您可以使用访问控制列表(Access Control List,ACL)在products控制器中创建一个操作,并使用它为每个经销商aco上的用户访问请求对象(ARO)授权create访问权限。
Using access-control lists (ACLs), you could have created an action in the products controller and used it to grant create access to the user's access-request object (ARO) on each dealer ACO.
这个RA可以注册用户并管理证书请求,而不需要直接访问证明者ID和口令。
This RA can register users and manage certificate requests without having direct access to the certifier ID and password.
不用害怕,如果您想在互斥以外做一些奇特的事情,比如流处理或延迟呈现,您仍然可以访问原始的mongrel请求。
Fear not, you'll still have access to the raw mongrel request if you want to do fancy stuff like streaming or deferred rendering outside the mutex.
请求访问或修改配置数值或数据变量。
Requests to access or modify configuration values or data variables.
如前面部分“统一流程”中介绍的,您最初的评估应确定:哪些用户需要访问变更请求,如缺陷?
As described in the "a unified process" section earlier, your initial assessment should determine: Which users will need access to change requests such as defects?
如前面部分“统一流程”中介绍的,您最初的评估应确定:哪些用户需要访问变更请求,如缺陷?
As described in the "a unified process" section earlier, your initial assessment should determine: Which users will need access to change requests such as defects?
应用推荐