Many users employ a shadow copy of their database (Figure 4) to support large and ad-hoc queries against the operational data.
许多用户使用数据库的影子副本(图4)支持基于操作数据的大型专用查询。
2
Password file-base authentication: authentication is based on the password and shadow files or interaction with Network Information System (NIS), on the machine where the database server is installed.
基于密码文件的身份验证:身份验证基于安装数据库服务器的机器上的密码和影子文件,或者与Net work Information System (NIS)的交互。
3
This graph shows the number of messages that were in the database I was running a test on, plotted over time. I added in a logo, a drop shadow effect, and a stats table of the test run.