配置管理 的英文怎麼說

中文拼音 [pèizhìguǎn]
配置管理 英文
cfm configuration management
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. My project is to research and devise a enterprise scm software system, that based the two grades and four libraries ( department development library, department controlled library, department development library, enterprise controlled library, enterprise product library ), and use the jbcm which was devised by the beijing beida software engineering co., ltd. as the antitype. we call it cmis

    本課題就是以中國電子科技集團公司第十研究所為需求方,以北大軟體配置管理工具軟體jbcm為原型,進行二次開發,研製一套基於兩級四庫(即部門開發庫、部門受控庫、企業受控庫和企業產品庫)模式下的企業級軟體配置管理系統( cmis ) 。
  2. Written by ed brill, who works for ibm lotus managing the positioning of lotus software solutions

    ,由ed brill編寫,他從事ibm lotus對lotus軟體解決方案的配置管理工作。
  3. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代作為一種先進易用的防火墻技術的原,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  4. The local network resoure management system is mainly engaged in the lacal network resoure management, at the same time and the network quality managerment as well, also including network line - pipe management, equipment management, configure management, topology management, attemper management and systimatic analysis, the main equipments include pdh, sdh, dwdn, idlc, pon, fwa, adsl, bits etc. by means of the main equipments " s resoure attemper and running state, we can finds out something abnornal in operation, from the whole point of local network, adjusting network is to be made to reach overal optimiztion. ensuring the network operating quality, realizing the the dispatching solution on the basis of network resource management and circuit closed - loop dispatching circulation

    本地網網路資源系統是側重於本地網網路資源的,同時兼顧網路質量。重點網路、設備配置管理、拓撲、調度以及統計分析,主要設備包括pdh 、 sdh 、 dwdn 、 idlc 、 pon 、 fwa 、 adsl 、 bits等。通過主要設備的資源備和運行狀態,該系統發現處運行異常,從本地網全局的角度調整網路達到整體優化,保證網路的運行質量,在網路資源的基礎上,實現調度方案的生成,以及電路通道的閉環調度流程。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統員的權力和責任,包括物安全、系統、帳戶設及使用權限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在和應用方面提供了基本的框架。
  6. This sort of configuration management can be done for all acquirable components in the application architecture, from ejb components to jms queues and topics to simple configuration strings or other objects, lowering maintenance costs as services change over time, and easing deployment and integration efforts

    可以對應用程序架構中所得到的所有組件進行這類配置管理,從ejb組件到jms隊列和主題,再到簡單字元串或其他對象,這可以降低隨時間的推移服務變更所產生的維護成本,同時還可以簡化部署,減少集成工作。
  7. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路入侵檢測系統、病毒防護體系的安裝及工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  8. It would be nice if our source control tool would help

    那最好就是配置管理工具可以幫忙了。
  9. On the basis of analyzing problems of traditional configuration management system, this thesis takes performance, availability and scalability as implement goals, discusses the configuration management for redundant servers, and proposes a mobile agent - based adaptive configuration management system. the features of system are as follow : ( 1 ) it adopts hierarchical management architecture to manage redundant servers, so the system scalability is improved and the system overhead is reduced

    在分析傳統配置管理系統不足的基礎上,本文以性能、可用性、和擴展性為目標,對冗餘服務的配置管理問題展開研究,提出了基於移動代技術的適應性配置管理系統acms ,它的主要技術特點如下:採用層次化結構對冗餘服務進行,改善了系統的可擴展能力,減小了通信開銷。
  10. Cm configuration management construction management

    配置管理施工
  11. If you realize that you have no need for a platform, you can remove it using the configuration manager dialog box

    如果發現不需要某個平臺,可以使用「配置管理器」對話框移除該平臺。
  12. You can change the active platform using the configuration manager

    可以使用「配置管理器」更改活動平臺。
  13. Visual studio will compile your application to target the platform that is set as the active platform in the configuration manager dialog box

    Visual studio將對您的應用程序進行編譯,使其面向在「配置管理器」對話框中被設為活動平臺的平臺。
  14. ( 4 ) show network runing states by table or gragh according to the collected datas and calculated results, realize configuration management, performance management and fault management

    ( 4 )根據採集數據與計算分析數據,以直觀圖表的形式顯示網路狀態,實現配置管理、性能和故障
  15. Then we define criterions including a series of software practice process and method and tools, which are also fit most of home software corporation to application software exploration and fit them to improve their software exploration engineering management before passing evaluation of cmm. the criterions we defined using a series normative process and document to engineer software exploration, which include " project management criterion ", " configuration management criterion ", " software test criterion ", " document writing criterion ", " software exploration and maintenance criterion ", ' software life cycle guide ", etc. " project management criterion " defines area and principle of software research management, which is practiced to manage the people, technology, resources, software, process and so on to improve efficiency and to ensure quality and increase income

    《項目規程》定義軟體研發的范圍、原則,通過實施該規程來對項目中的人員、技術、資源、軟體、過程等進行全方位的,一西南石油學院碩卜學位畢業論文以達到提高效率、保證質量、降低消耗、增加收益的最終目的; 《配置管理規程》 ,通過實施該規程對項目開發過程中的所有資源進行控制; 《軟體測試規程》定義對軟體系統測試所用工具、過程和責任: 《文檔編制規程》提供滿足國家《計算機軟體文檔編制規范gb8567 》標準的各種文檔模板來建立統一的文檔編制規范; 《軟體開發和維護規程》定義了軟體開發過程以及採取的方法和工具; 《軟體生命周期指南》 ,根據軟體項目的經驗,將典型軟體過程形成軟體過程模型,用於指導以後軟體周期的選擇; 《年度公司規劃》 ,對需要公司總體安排的資源統一調度的過程。
  16. When the checkin has completed successfully, if i am working in " checkout - edit - checkin " mode, the scm tool will flip the read - only bit on my working files to prevent me from accidentally making changes without informing the server of my intentions

    當簽入成功完成的時候,如果我是用的「簽出編輯簽入」模式,配置管理工具將在我的工作文件處打上只讀標記阻止我意外的、在沒有通知服務器的情況下進行變更。
  17. At the base of theory research on the project, authors make a prototype system of pdm, and select the machine tool building industry having complicated pdm to practise, have developed the pdm having many fuctions included that product structure management, version management, product configuration management, product bom management, coding management, system management

    在課題論研究的基礎上,構架了pdm原型系統,並選擇了產品數據較為復雜的機床製造行業進行實踐,開發出了包含:產品結構、版本、產品配置管理、產品bom、編碼、系統的產品數據系統。
  18. The besiii software r & d environment uses linux system and object oriented c + + language. the underlying software framework is gaudi, which is also used by many other hep experiments. the configuration management tool ( cmt ) and concurrent versions system ( cvs ) are adopted for the configuration management of our software

    Besiii的軟體開發環境使用linux系統以及面向對象的c + +語言,借鑒了國際上許多大型高能物實驗採用的gaudi軟體框架,並使用了配置管理工具( configurationmanagementtools , cmt )和並發版本系統( concurrentversionssystem , cvs )作為軟體開發設計的配置管理軟體。
  19. Through the software merit rating of the military research unit, enhancing the software configuration management, the autonomous test by the third party and based on the software life cycle, this paper discusses how to enhance the quality control of the military software

    本文在闡述軟體生命周期的基礎上,從開展軍用軟體研製單位的軟體能力評價、加強軟體配置管理和加強第三方獨立測試三個方面探討了如何加強軍用軟體的質量
  20. Typically, the software configuration management engineer is the one who enforces policies, such as which branches are writeable and when a branch should be created

    通常,軟體配置管理工程師是實施策略(例如,哪些分支是可寫的,以及何時應創建分支)的人。
分享友人