恢復庫 的英文怎麼說

中文拼音 [huī]
恢復庫 英文
recovery library
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和、操作系統安全、數據系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. America ' s job bank ? a searchable database of jobs and resumes

    美國職業銀行-職位檢索數據
  4. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業信息系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障能力,並在這個基礎上進一步強化了安全性、可管理性和高可用性的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據、不同網路環境緊密的聯系起來,並在應用層提供了互操作性的功能。
  5. Milanello - the unavailable players for the match against benfica went to milanello to continue the recovery program : in detail, the strengtehning in the sand bath for emerson and jankulovksi and therapy for ba

    米蘭內洛不能前往裡斯本的球員繼續在內洛進行訓練:埃莫森和揚在沙地進行力量訓練,易布拉辛巴繼續治療。
  6. Application of soil seed bank in wasteland revegetation project

    土壤種子在荒廢地植被工程中的應用
  7. Potential role of soil seed banks in vegetation restoration and reclamation

    土壤種子在植被與重建中的作用與潛力
  8. Typically this recovery is achieved when database is running in archivelog mode and backup online

    通常該是當數據運行在archivelog模式下和聯機備份時取得的。
  9. After an explosion the explorer restored the storage of the explosive in the exploiter ' s storehouse

    爆炸過后勘探者了剝削者的倉里炸藥的儲量
  10. When a user drops a table in db2 udb, you can either do a database level point - in - time recovery, rolling forward to the point before the table is dropped ; or, better still, use a table space level roll forward operation

    當用戶刪除db2 udb中的表時,您可以執行數據級時間點,前滾至刪除表之前的時間點;或者最好仍然使用表空間級的前滾操作。
  11. Uncommitted transactions are undone by being rolled back, unless they hold locks that prevent other transactions from viewing transactionally inconsistent data

    為了數據,必須通過回滾這些未提交的事務所做的更改以將其撤消。
  12. The runtime reverts to jit compilation of an assembly if it cannot find a matching native image

    如果運行沒有找到匹配的本機映像,它將為程序集的jit編譯。
  13. The runtime reverts to jit compilation of an assembly, if it cannot find a matching native image

    如果運行沒有找到匹配的本機映像,它將為程序集的jit編譯。
  14. To provide tourists a place for taking good rests after a long journey and visit, it is proposed to build a tang - style and attic three - star hotel at the southern bank of the reservoir and in the east of lvyou road

    鑒于遊客在旅途勞頓及景區游覽后調整自己體力,疲勞狀態,擬在水南岸旅遊路東側修建一座仿唐閣樓式三星級酒店。
  15. To ensure fast recovery of the partition containing system catalog tables, avoid placing user tables on the same database partition

    為了確保包含系統編目表的分區能夠快速,應避免將用戶表也放在那個數據分區上。
  16. During a restore of database, exclusive use is required

    在數據期間,該記錄的使用具有排它性。
  17. Remember, a full database restore will require exclusive use for the entire restore operation, whereas online restore of a table space will only require that tablespace to be in exclusive mode

    記住,完全數據將要求整個操作具有排它性,而表空間的聯機將只要求表空間處于排它模式中。
  18. Restore from database files

    從數據文件
  19. Distribute database method is adopted in the designing, drawing flow chart, bringing forward the security technology of distribute database, solving the problem of data synchronization and file comeback

    設計中採用數據分散式設計方法,繪制了數據流程圖,提出了分散式數據安全技術,解決了數據同步和數據文件問題。
  20. Most of the thesis focus the particular design of middelware platform. transaction manager, transmission manager, channel manager and link manager of middelware platform is implemented by author. and safe return library of middelware platform is reconstructed by author based on an open source project - lpsm

    中間件平臺中的交易管理器、傳輸管理器、通道管理器和連接管理器是作者在理論和工程實踐指導下獨立設計開發的,安全恢復庫則是在開源項目lpsm基礎上修改而成。
分享友人