log request 中文意思是什麼

log request 解釋
選擇日誌記錄請求
  • log : n 1 原木,圓木,乾材。2 測程儀,計程儀。3 航海日誌,(飛行員用的)航海日誌;旅行日記。4 〈英國〉...
  • request : n 1 請求,懇求,懇請;要求,需要。2 要求物,需要品,請求之事;請求文,請願書。vt (鄭重或正式)請...
  1. If you don t know the 6 - digits document numbers, please see above and press " 2 " to request the " wireless file log " first

    請依照電訊新聞目錄上的文件編號( 6碼)來索取文件。如果您沒有上述目錄,請先選電訊新聞目錄索取目錄。
  2. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。
  3. The security request of the mobile - agent system is to protect the agent from the attack of the malicious machine and agent as well as to protect the machine from the attack of the hostile agent. hierarchical integratedsecure model in jade provides effective, extensible security framework for mobile agent by integrating bi - direction authentication, authorization, java security policy, environment based key generation, and audit log

    Made移動代理系統的層次化的集成安全模型在現有的安全技術基礎上,將雙向身份驗證、資源存取授權及控制、 java語言安全設施以及基於環境的密鑰產生法和核查日誌等方法有機地結合起來,為移動代理和運行環境提供了一個實用的可擴展安全環境。
  4. At this point, the new user can log in to the portal with the username and password chosen during the account request and activation process

    現在,這個新用戶就可以使用在帳號請求和激活過程中選擇的用戶名和密碼登錄到門戶中了。
  5. If you register for a newsletter, log on to certain who sites, order a book, request information, provide feedback, apply for a job, join a discussion group or join an electronic mailing list, you will be asked to provide personal information such as your name, postal address and e - mail address

    如果你登記訂閱一份通訊、登錄特定的世界衛生組織網站、訂購書籍、索取信息、提供反饋、申請就業、參加一個討論組或參加一個電子郵寄清單,將要求你提供個人信息,例如姓名、郵寄地址和電子郵件地址。
  6. The second field indicates the thread making the log request

    第二個欄位表示日誌記錄請求生成的線程
  7. S log request is suppressed

    的日誌請求。
  8. The fourth field equals the name of the category associated with the log request

    第四個欄位等於與日誌請求相關的類別名稱
  9. When logging is turned off entirely or for a set of priorities, the cost of a log request is a method invocation plus an integer comparison

    當完全關閉日誌記錄或者對於一組優先級關閉了日誌記錄時,日誌請求的開銷就是方法調用加上整數比較。
  10. To troubleshoot issues related to domino web server crashes and hangs, lotus software technical support will often ask you to create an http request log

    為了故障診斷與domino web服務器崩潰和掛起有關的問題, lotus software technical support通常會要求您創建http請求日誌。
  11. Finally, according to the mode of two - roles in teaching, which should give play to teachers " leading role and also fully reflect students " cognitive subject. and on the basis of following the course teaching design principle of the network, carry on the website design and develop of the course of " hydraulics & pneumatics ". firstly utilize frontpage2000 of the developing instrument of web page to designed and develops website ' s overall style, the interface, style of navigating and studying the supplementary function that courses need ; then utilize jsp and javabeans discreteness technology to carry on real procedure making, in order to reach the function of various kinds of websites and teaching purpose, such as the operation to backstage supporter ' s data base, realize website ' s registration and log on, realize the search and study offered for studying and is tracking the studying ; then imbed the network packs in the corresponding web page, and regulate the linking of these web pages, make it reach anticipated request, and debug running in campus network

    最後,按照雙主教學模式(即發揮教師的主導作用和學生的認知主體作用) ,並且在遵循網路課程教學設計原則的基礎上,進行「液壓與氣壓傳動」課程的網站設計與開發:利用網頁開發工具frontpage2000進行網站總體風格、界面、導航風格以及學習課程所需輔助功能的設計與開發;利用jsp及其, tavabeans組件技術進行實際的程序開發,以達到對后臺數據庫的操作、實現網站注冊及登錄、實現為學習提供的搜索和學習跟蹤等等各種網站功能及教學目的;把網路打包好的課件嵌入相應的網頁中,並對這些網頁的鏈接進行調節,使其達到預期的要求,並在校園網上進行調試運行通過。
  12. They simply request an account using a typical web form interface, and after the account is created, they log in to the portal using a familiar username password combination

    他們可以簡單地使用典型的web表單界面來請求一個帳號,在這個帳號被創建之後,他們就可以使用熟悉的用戶名/密碼組合登錄門戶了。
  13. At the very least, if all threads write a log message when a thread dies, you will have a record of what went wrong and where, rather than just wondering where your request - handling thread went

    至少,如果在線程死亡時所有線程都寫一條日誌消息,您將有一個何時、何處出錯的記錄,而不是只能奇怪您的請求處理線程到哪裡去了。
  14. In a lighter technique, you can uniquely stamp each log request initiated from the same client interaction, an approach described by neil harrison see resources

    )想出了一個簡便方法,可以唯一標記從同一個客戶機交互啟動的每一個日誌記錄請求。
  15. Request that the error be logged in the database engine error log and the microsoft windows application log

    請求將錯誤記錄到數據庫引擎錯誤日誌和microsoft windows應用程序日誌中。
  16. Typically, the user log into the secure domain and request to be authenticated

    很典型地,用戶可以聯機進入安全域並請求被證實。
分享友人