users ' access patterns 用户访问模式
We derived our deployment requirements from a thorough understanding of our users' access patterns, and the realization that we could not spend time managing physical hardware.
我们通过充分了解用户的访问模式确定了部署需求,同时意识到不能花时间去管理物理硬件。
As an administrator, you can use permission controls to define users that have access to deploy WebSphere CloudBurst patterns to the cloud.
作为一名管理员,您可以使用权限控制来定义能够将WebSphere CloudBurst模式部署到云上的用户。
By theoretic analysis and experimental tests, the algorithm can be used to discover all types of users frequent access patterns.
通过理论分析和实验验证,该算法可以有效地发现用户频繁访问模式。
应用推荐