The previous article in this series examined.
本系列中的前一篇文章研究了。
This mechanism was described in the previous article.
上一篇文章中描述了这一机制。
This is the same approach as taken in the previous article.
这个方法和前一篇文章所采用的方法相同。
Listing 7 recycles Excel-reading code from the previous article.
清单7重复利用前一篇文章的Excel读取代码。
For detailed steps, consult the previous article in the series.
详细的步骤请参阅本系列的上一篇文章。
Compare this diagram with the one you used in the previous article.
将这个图表与前一篇文章中所使用的图表进行比较。
The previous article explored how to determine your architectural needs.
前一篇文章讨论了如何确定您的体系结构需求。
This model is an extension of the model introduced in the previous article.
该模型是上一篇文章所介绍的模型的扩展。
All the examples in the previous article focused on read-only access to the API.
先前文章中的所有示例都着重关注于api的只读访问权。
This is an updated EAR file based on the one we have used in our previous article.
这是一个在以前文章中使用的文件基础上更新的EAR文件。
Take a look at the code in Listing 1, which is an example from the previous article.
看一下清单1中的代码,这是上一期文章中的一个例子。
For all the classic examples check out this previous article on attentional blindness.
可以在之前的文章中查看有关注意视盲的经典案例。
You may remember from the previous article that the file had the following format.
您可能记得上篇文章中该文件有如下格式。
The previous article included the manual steps to accomplish network customization.
先前的文章包括了完成网络自定义工作的手工步骤。
In my previous article, I discussed the foods you can eat and are beneficial for your skin.
在我以前的文章里,我讨论过对皮肤有用的食品。
In my previous article, I talked about threaded code that did unusual and unexpected things.
在前一篇文章中,谈到了会导致异常结果的线程代码。
As in the previous article, two sets of request sequences were used for the performance tests.
正如之前的文章所述,有两组请求序列用于性能测试。
We introduced the basics of the code generation facility in the DPTK in a previous article.
我们在上一篇文章中介绍了DPTK中代码生成工具的基础知识。
However, you may still find it helpful to review our previous article for background information.
不过,在这里对之前的文章作一个回顾,以作为背景信息,还是有所帮助的。
Let's start by reviewing the service providers that were implemented in the previous article.
我们首先回顾在前面的文章中被执行的服务提供者。
Let's start by reviewing the service participants that were implemented in the previous article.
让我们从评审前面文章中执行的服务参与者开始讨论。
A previous article, "Plugging memory leaks with weak references," offers some helpful techniques.
以前的一篇文章“用弱引用堵住内存泄漏”给出了一些有用的技巧。
You can use a custom mediation primitive, similar to what was demonstrated in my previous article.
您可以使用自定义中介元素,这与上一篇文章中演示的类似。
You can also use the other testing tools that were outlined in the previous article in this series.
您还可以使用本系列前一篇文章中列举的其他测试工具。
Since I covered process management in my previous article, I won't discuss that phase in detail here.
由于已经在前一篇文章中讨论了流程管理,因此将不在此处对该阶段进行详细说明。
This information may be obtainable from an LDAP directory as we demonstrated in our previous article.
这些信息可以通过我们在上一篇文章中介绍的LDAP目录获得。
We will use the business process model from the previous article as input into service identification.
我们将利用上一篇文章中的业务流程模型作为服务识别的输入。
In the previous article (Part 2), you saw how you can pass a parameter to a single table in the report.
在前面的文章(第2部分)中,您会看到怎样向报告中的单个表格传递一个参数。
As discussed in the previous article in this series, the square brackets () enclose optional parameters.
如本系列的上一篇文章所述,方括号()包括可选参数。
While the previous article focused on the IBM service logs, this article will focus on the Diagnostic traces.
以前的文章都集中描述IBM服务日志,本文将集中讨论诊断跟踪。
应用推荐