配置管理員 的英文怎麼說

中文拼音 [pèizhìguǎnyuán]
配置管理員 英文
configuration librarian
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 員名詞1. (指工作或學習的人) a person engaged in some field of activity 2. (指團體或組織中的成員) member Ⅱ量詞(用於武將)
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  • 管理員 : administrative officer
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. This feature saves administrators from the gruelling task of finding the right configuration parameters that best suit a database

    這一特性就避免了費盡心思地去尋找最適合數據庫的參數。
  2. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統可以較有效地監視、審計、評估自己的系統。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統的權力和責任,包括物安全、系統、帳戶設及使用權限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在和應用方面提供了基本的框架。
  4. Set up swish swash profile by administrator

    swish swash文件:
  5. Then we define criterions including a series of software practice process and method and tools, which are also fit most of home software corporation to application software exploration and fit them to improve their software exploration engineering management before passing evaluation of cmm. the criterions we defined using a series normative process and document to engineer software exploration, which include " project management criterion ", " configuration management criterion ", " software test criterion ", " document writing criterion ", " software exploration and maintenance criterion ", ' software life cycle guide ", etc. " project management criterion " defines area and principle of software research management, which is practiced to manage the people, technology, resources, software, process and so on to improve efficiency and to ensure quality and increase income

    《項目規程》定義軟體研發的范圍、原則,通過實施該規程來對項目中的人、技術、資源、軟體、過程等進行全方位的,一西南石油學院碩卜學位畢業論文以達到提高效率、保證質量、降低消耗、增加收益的最終目的; 《規程》 ,通過實施該規程對項目開發過程中的所有資源進行控制; 《軟體測試規程》定義對軟體系統測試所用工具、過程和責任: 《文檔編制規程》提供滿足國家《計算機軟體文檔編制規范gb8567 》標準的各種文檔模板來建立統一的文檔編制規范; 《軟體開發和維護規程》定義了軟體開發過程以及採取的方法和工具; 《軟體生命周期指南》 ,根據軟體項目的經驗,將典型軟體過程形成軟體過程模型,用於指導以後軟體周期的選擇; 《年度公司規劃》 ,對需要公司總體安排的資源統一調度的過程。
  6. An administrator is responsible for maintaining the integrity of data stored in the software configuration management system

    負責維護軟體系統中存儲的數據的完整性。
  7. The system of product structure and configuration management based on software component was developed and used in cscd, which solved the problem of product data management and design variance in large - scale complicated product design, enhanced the efficiency of product development and promoted product innovation

    建立基於構件的產品結構和系統,並應用於協同設計中,解決了復雜裝產品的產品數據和設計變遷問題,增強了設計人的團隊協作能力,對提高產品開發效率和促進產品創新具有重要的意義。
  8. To resolve the issues of object group ' s life cycle management and fault tolerance properties management, an object factory model is designed to load the objects dynamically, two kinds of member creation patterns are introduced, a set of fault tolerance properties are defined according to the common characteristics of the fault - tolerant system, and moreover a hierarchy model is proposed to enable the dynamic and flexible configuration

    ( 1 )針對復制必須解決的對象組生命周期和容錯屬性,本文設計了一個能夠動態部署和創建對象的對象工廠模型;引入了對用戶透明程度不同的兩種成創建模式? ?基礎設施控制和用戶控制;並圍繞容錯系統的共有特徵定義了一組容錯屬性,設計了層次化的屬性模型,允許應用動態靈活地容錯屬性。
  9. As it ’ s user not only including software developing man but also the qm man, test man, pm man and the enterprise leaders, it need to fit the different requirement of the users

    Cmis的用戶不僅包括軟體設計師還包括了質量、測試人、項目和企業各級領導。
  10. A three - layer system frame according with j2ee standard was adopted in system structure and oracle was used as basic network database of system, so that the data can be saved safely and searched with high speed. this system has such basic pdm functions as project management, human resource management, right management, product configuration management, etc. and, it was applied to a certain extent in enterprises

    系統體系結構採用了符合j2ee標準的三層系統架構,使用oracle作為系統的底層網路數據倉庫,實現了數據的安全存儲和高速查詢,該系統具備了項目,人,權限,產品,版本等基本的產品數據功能,並在企業獲得一定程度的應用。
  11. After gaining deep insight into websphere portal as a chief programmer, carsten now focuses on the architecture of the foundation in the areas of state handling and configuration management

    通過擔任首席程序, carsten對websphere portal有了深刻的了解,現在他主要從事狀態處領域基礎架構方面的工作。
  12. The stream concept represents a change in mindset for many experienced software configuration managers, most of whom are used to thinking of baselines as versions of components

    工作流的概念體現了大多數經驗豐富的軟體配置管理員認識上的一個改變,他們中的許多人習慣把基線當作是組件的版本。
  13. International organization for standardization defined five conceptual areas of management, which are fault management, accounting management, configuration management, performance management and security management as the scale of network increases rapidly, it is a very difficult task to manage all the devices on the present network with the traditional individual management tools

    網路包括故障、賬務、性能和安全等五大功能域。由於網路規模的快速擴大,傳統的網路工具已經不能有效地滿足網對當今網路的綜合需求。
  14. In the subsystem, the c / s mode is introduced, and the client runs on windows platforms, and the server runs on firewalls

    設計並實現了gategod客戶端程序。系統使用c s模式,它位於熟悉的windows平臺。
  15. Administrators can control the firewall by the client on windows hosts, not on firewalls. it can exempt firewalls of risks

    而對應的服務器端程序位於需的防火墻上,避免直接在防火墻上操作帶來的不安全性。
  16. Through integration with the original project manage system, this product can do the identification, change control, statistic and audit for all the r & d project software of the enterprise. and more, it offers many enterprise managing functions, including the scm plan, test process manage, team manage and product release manage

    Cmis通過和企業原有的項目系統的集成,實現了對企業所有項目的軟體項的標識、控制、統計和審計功能,還實現了計劃、軟體開發人、測試流程、產品發布的功能。
  17. Subsequently the paper describes the four roles and the three groups defined in sqcf : senior manager, project manager, task leader, project staff, software configuration management group, software quality assurance group and system test group

    接著,給出了在sqcf中定義的必不可少的4個角色和3個組:高級經、項目經、任務負責人、項目成、軟體組、軟體質量保證組和系統測試組。
  18. This guide provides guidance for ogcio staff to plan and implement software configuration management ( scm ) in development and maintenance stages of application software

    本指引的目的,是為政府資訊科技總監辦公室人于應用軟體的發展及維修階段中,進行軟體的規劃及推行時提供指引。
  19. This guide is to provide guidance for ogcio staff to plan and implement software configuration management ( scm ) in development and maintenance stages of application software

    本指引的目的,是為政府資訊科技總監辦公室人于應用系統軟體的發展及維修階段中,就軟體的規劃及推行工作提供指引。
  20. Configuration management board

分享友人