数据自动备份

数据自动备份数据自动备份
  1. 以这些功能为基础本文介绍了两个移动资源分布式管理的应用,分别是:IP资源管理和VLR用户数据自动备份。

    And two applications are introduced in this paper . They are IP resource management , and VLR Mobile user data auto backup . They both build on Memory Resident Database .

  2. 利用Winrar与任务计划实现网站数据自动备份

    Realizing Website Data Automatic Backup through the Employment of Winrar and the Planning Task

  3. 国家数字地震台数据自动备份软件

    A software of automatically backup data in digital seismic station

  4. 地震数据自动备份程序

    The program of automatic backup about seismic data

  5. 增加射频数据自动备份单元,就是射频数据传输给信息管理中心的同时,射频数据会自动保存在射频识别装置里,以方便信息管理中心可以随时调用。

    Increasing the RF data of automatic backup unit , which the RF data transmit to the information management center , the RF data is stored in RF identification device automatically in order to facilitate information management center to call at any time .

  6. 用WinRAR实现数据的自动备份

    Data Auto-Backup By Using WinRAR

  7. 运用WinRAR的命令行参数,可简化操作过程,实现数据的自动备份。

    The command line switchs of Winrar can be used to simplify the process of operation , and the data can be auto-backuped .

  8. 进行了异常情况处理设计。在特殊或出错情况下,对于数据有自动备份恢复功能。5、为各级用户提供了不同权限的多组合条件查询统计功能及报表打印功能。

    In the case of special or wrong , have automatic data backup and recovery capabilities . 5 , for all levels of users with different permissions for many statistical functions and the combination of conditions of inquiry and report printing function .

  9. 举例来说,亚马逊关系数据库服务AmazonRelationalDatabaseService(RDS)提供了无数据丢失的自动备份和还原服务。

    For example , the Amazon Relational Database Service ( RDS ) provides automatic backup and recovery with virtually no data loss .

  10. 分析了SqlServer触发器及其两个相关逻辑表,给出了触发器应用于数据自动更新和数据备份的两个实例。

    This paper presents SQL Server trigger and the two related logic tables and gives two examples that the trigger is used to automatically data updating and backup .

  11. 数据安全性方面包括基于权限的用户界面设计、用户认证、定期修改密码、系统管理员行为的限制、数据加密、数据校验、自动备份与自动恢复、登记操作记录。

    Consideration of data security includes user interface design based on authentication , password modification timely , control of the system administrator 's operations , data encryption , data checking , backup and restore automatically , recording of user 's operations .