求几道E文问题,分不够再加
这些怎么实现:
1.advanced database techniques such as for example ACID transactions, prepared statements, stored procedures, together with caching and pooling for high performance.
2.security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security.
3.back-end web services to provide access to external, third party, data sources, using either REST or SOAP-based communication mechanisms.
4.dynamic and configurable page layout and user interface using for example master pages, web parts, portlets, skins and style sheets.
5.web 2.0 technologies using for example agents together with collaborative and community-building facilities.
[解决办法]
数据库访问的例子,可以看Enterprice Library2.0。
web2.0建议你到www.asp.net
[解决办法]
1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
[解决办法]
1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
哈哈,翻译的真好!
[解决办法]
就是说明一下,
简单解释一下
--------------------
wiki:en.wikipedia.org/wiki/
acid:In databases, ACID stands for Atomicity, Consistency, Isolation, and Durability. They are considered to be the key transaction processing features of a database management system, or DBMS. Without them, the integrity of the database cannot be guaranteed.
asymmetric encryption:
Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key. It is impossible to derive (“hack”) the decryption key from a known encryption key (with reasonable computing power, time and money. Asymmetric encryption typically is used for public key encryption.
REST:Representational State Transfer is a model for web services based solely on HTTP. REST takes the view that the Web already has everything necessary for web services, without having to add extra specifications like SOAP and UDDI. Any item can be made available (ie, represented) at a URI, and, subject to the necessary permissions, it can be manipulated using one of the simple operations defined within HTTP (GET to retrieve information, PUT and POST to modify it, DELETE to remove it).
......
4.参考asp.net 2.0的教程
5.web2.0:不懂,lz有时间可以参考博客堂/园的开源项目
[解决办法]
1.advanced database techniques such as for example ACID transactions, prepared statements, stored procedures, together with caching and pooling for high performance.
高级数据库技术包括如事务ACID特性、预声明、存储过程、以及高性能的缓存及数据池等。
2.security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security.
安全性如同步或异步加密的使用、安全散列法、数字认证和签名、防火墙、应用层安全传输等。
[解决办法]
3.back-end web services to provide access to external, third party, data sources, using either REST or SOAP-based communication mechanisms.
后端Web服务提供外部、第三方或数据源等的访问,使用REST或基于SOAP的(数据)交换机制。
4.dynamic and configurable page layout and user interface using for example master pages, web parts, portlets, skins and style sheets.
动态的可配置的页面布局或用户界面使用模板页、web部件、portlets、皮肤、样式表等实现。