1·The business data information is maintained and manipulated intact in both the application and database layers, and as you will see in Part 3, even in the client layer.
在应用程序层和数据库层中都按原样维护和操作业务数据信息,而且您将第3部分中看到,甚至在客户机层中也是如此。
2·Another aspect of Security Management that can now be visually created and manipulated is Method Permission.
用户能够直观地创建和操作安全性管理的另一个方面是方法许可。
3·In almost all cases, mediations require access to the message itself so that it can be manipulated, logged, transformed, or whatever the specific use case may be.
几乎在任何情况下中介都需要访问消息本身,以便操作、记录和转换消息,不管在任何特定用例下,都是如此。
4·However, in all cases the models are the primary artifact created and manipulated by developers.
然而,在所有的情况下,模型都是被开发人员创建和操作的主要产物。
5·This works under most circumstances, but occasionally, business requirements demand that data be stored in something like a spreadsheet that can be more easily manipulated by individuals.
大多数情况下,这种方法是有效的,但是偶尔地,因为业务需求,可能会要求将数据存储在更容易被人操作的电子表格之类的地方。