求几道E文问题,分不够再加
这些怎么实现:
1.advanced database techniques such as for example ACID transactions, prepared statements, stored procedures, together with caching and pooling for high performance.
2.security such as for example, the use of symmetric and asymmetric encryption, secure hashing, digital certificates and signatures, firewalls, transport and application level security.
3.back-end web services to provide access to external, third party, data sources, using either REST or SOAP-based communication mechanisms.
4.dynamic and configurable page layout and user interface using for example master pages, web parts, portlets, skins and style sheets.
5.web 2.0 technologies using for example agents together with collaborative and community-building facilities.
------解决方案--------------------数据库访问的例子,可以看Enterprice Library2.0。
web2.0建议你到www.asp.net
------解决方案--------------------1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
------解决方案--------------------1.advanced数据库技术等酸性交易为例,编制报表,存放程序 加上缓存和高性能汇聚. 例如2.security例如使用对称和不对称加密、散列安全、数字证书及签名、防火墙、 运输安全和应用水平.
3.back端Web服务以通往外部、第三方数据源,无论用肥皂或休息的沟通机制.
4.dynamic页面、用户界面配置和使用举例师父页网页零部件portlets、皮肤和风格表. 5.web2.0技术运用举例代理商一起协作和社区建设设施.
哈哈,翻译的真好!
------解决方案--------------------就是说明一下,
简单解释一下
--------------------
wiki:en.wikipedia.org/wiki/
acid:In databases, ACID stands for Atomicity, Consistency, Isolation, and Durability. They are considered to be the key transaction processing features of a database management system, or DBMS. Without them, the integrity of the database cannot be guaranteed.
asymmetric encryption:
Asymmetric encryption uses different keys for encryption and decryption. Each participant is assigned a pair of keys, consisting of an encryption key and a corresponding decryption key. It is impossible to derive (“hack”) the decryption key from a known encryption key (with reasonable computing power, time and money. Asymmetric encryption typically is used for public key encryption.
REST:Representational State Transfer is a model for web services based solely on HTTP. REST takes the view that the Web already has everything necessary for web services, without having to add extra specifications like SOAP and UDDI. Any item can be made available (ie, represented) at a URI, and, subject to the necessary permissions, it can be manipulated using one of the simple operations defined within HTTP (GET to retrieve information, PUT and POST to modify it, DELETE to remove it).
......
4.参考asp.net 2.0的教程
5.web2.0:不懂,lz有时间可以参考博客堂/园的开源项目
------解决方案--------------------1.advanced database techniques such as for example ACID transactions, prepared statements, stored procedures, together with caching and pooling for high performance.