“server”可以造什么句,server造句

来源:语文精选馆 3.24W
server造句

ISM (Internet server manager)

Ye cannot server god and mammon.

The Web server is just one application.

The client will send a certificate to the server only if the server requests one.

The Persevere server has Built-in, data-centric security capabilities that are enforced on the server.

You set up a replica of the LDAP server to respond as a backup server.

It serves as the glue between client and server code.

If a client disconnects from this chat server and anyone sends a message, the server will crash.

An application server is a generalized server that exposes business logic to client applications through various protocols, possibly including HTTP.

Be sure to upload the changes to the server.

When the primary server goes offline for (planned or unplanned) downtime, the standby server is available to be brought online.

If a client needs to get a stock quote from the server, it sends a request message to the server, and the server sends out a response message to the client.

The status of the agent is enabled on the local replica; the server is set to the home mail server and this information is replicated to the server where the agent operates.

The DWR framework can be used to receive these events on the server side but where the conversational state needs to be maintained on the server side?

A way of drawing to the screen without using the window server. As this avoids client-server communication, it is much faster.

You only need a basic web server for your Cappuccino applications.

Every module running on the server will also typically reference libraries or other modules.

Using any form of authentication on the Subversion server will result in performance loss.

The second portion of the code in Listing 3 contains the logic that obtains the appropriate XML data from the database server and manipulates it in the application server.

It sends information up to our server, and our server does this global matching algorithm to figure out which two phones in the world got the same bump at the same time in the same place.

You've hooked your server up to a UPS, and have the UPS monitoring software up and running so that your server will shut down safely in the case of an extended power outage.

This permits audit information to be stored on a centralized server to which only auditors have access.

For application placement type tasks, a typical action plan would consist of the single step of starting another server.

Some of the processing requires getting information from objects. If this information can be acquired directly from the database server, we can avoid instantiating them.

Most users will not sit next to HANA box in a server room - they will be on a WAN, VPN connection etc.

So I don't want to round-trip the entire form to server just to validate a single field, or download the thousands of possible airport IATA codes to the client each time.

As such, a typical JAX-RPC runtime maintains the session data separately for each individual stub even though stubs may talk with services running at the same back-end server.

It means, that even if the aggressor takes control over the machine where data is stored or machine with the application server, he can't read some business critical data from the database.

Unfortunately, a similar problem has arisen there—every time a user makes a change to a document or setting, she is typically required to click a Submit or Save Changes button, once again forcing her to think about how the system works—in this case in terms of a client-server architecture.

Internet server manager

What if the server goes down?

For example, they are generally geared for a single-server versus distributed, multi-server environment.

Using this mechanism the server attempts to verify the credentials from another external directory server or a pass-through server on behalf of the client.

This solution means that a server machine cannot reboot unattended.

If there is an acting primary server, then the primary server will do nothing with that database.

The ability to pre-configure applications and tailor the server configuration as needed allows a user to devote the resources of the server to application work rather than app-server overhead.

The contact and exchange of information between the client and the server begins with the client formatting a packet, as shown below, and sending it to the server.

To the user, the entire directory of network resources is accessible from the local server.

While many programs do see a speedup with the server JVM, the speedup you see here is simply a measure of a badly written benchmark, not the blazing performance of the server JVM.

Note that this does not preclude the server from also providing support for the traditional, relational interfaces.

You can also deploy snapshots to a server if you have a development, test, and production environment.

The load tests require more resources, and all will share from the same physical server, so these benchmark tests should not be performed on operating system-virtualized systems.

Because HTTP is stateless, unless some kind of session token is passed back and forth on every request, the server has no way to link together requests made by the same person.

In the Save a copy every box, type an integer value between 0 and 168 for how often you want the server to save a copy of the log file for this component. Type 0 if you don't want to save copies.

Each server transfers all mail messages to the other server.

The event server profile Settings define the persistence and distribution behavior of the CEI server.

Improper shutdowns of the server might lead to inconsistent states.

Quite simply, what the standby server is doing when everything is running just fine has a lot to do with how DB2 on that server is licensed.

For the initial test, start the server then deploy all four modules.

On the DBMS server, the solution must ensure that all traffic is captured-including direct connections to the DBMS server, such as ssh-and that the solution cannot be disabled without authorization.

Rather it is an overall system design consideration based on the anticipated raw data size of the entire database and capacity of the server hardware.

Protocol extensions proposed by the FSWG enable file-sharing through the ability to create hybrid NAS/SAN architectures.Such a configuration connects clients to a hybrid NAS/SAN server via TCP/IP and to the SAN disk array via the Fibre Channel Protocol.

You will deploy this application later on the test server.

With separated environments, if one server goes down, the other instance on the second server can still be up and connected.

Even on a single physical server, you can have redundant power supplies, error-correcting RAM, redundant disks, and copious monitoring of pre-fault indicators.

The server is introducing the pub.

Business processes can be deployed and run without being exported to an external installation of the application server.

Setup failed to configure the server. Refer to the server error logs and setup error logs for more information.

This invokes a script that USES an embedded in-memory database and an embedded Jetty Web container, so you do not need to set up a stand-alone server or database.

热门标签