Search: "do the following"
What do I do if my certificate order remains in the review stage for a long time - Certificates Service Documentation
process an OV certificate order, and up to seven business days to process an EV certificate order. During the review process, the CA may attempt to contact you for further verification purposes. If you are unable to contact you in a timely manner, the review schedule for the order may be delayed. ...
How do I deploy the issued certificate in Apache server - Certificates Service Documentation
Apache server using the following steps. Step 1: Check whether your digital certificate contains a certificate chain If you certificate file does not contain a certificate chain, skip the following steps in this document. Deploy your ...
How do I obtain the real IP of a client? - Web Application Firewall Documentation
HTTP head field, as shown in the following figure. The Alibaba Cloud WAF works as follows. Suppose that WAF protects the domain for the x-forwarded-for field content. The following are examples of request commands for several common languages. For ASP ...
How do I avoid exceptions when multiple processes and multiple clients write the same log file at the same time - NAS Documentation
may significantly affect performance. The following steps detail how to implement the flock with seek method in Linux. Call flock(fd, LOCK_UN) to release the filelock after the write operation. The following is a simple C language sample ...
AI Adoption: Do the Benefits Outweigh the Challenges? - Alibaba Cloud Community Site
Trends,Big Data,Artificial Intelligence,Deep Learning,Machine Learning This article forms the McKinsey's report on artificial intelligence (AI) as a basis to discuss the evolving field of AI and its diverse applications across multiple industries. ...
How do I set the request signature? - Table Store Documentation
indicates the version of the current Table Store API. The value is 1. Date has the following UTC format only options: %a, %d %b; The final input format is (assume that the AccessKey of ID1 is KEY 1, and the following signature string is calculated using ...
How do I set the response signature? - Table Store Documentation
the following rules: Headers are in lowercase. The headers are sorted in ascending lexicographic order by name. There cannot beThe response signature is contained in Authorization of the HTTP header, indicating the response is authorized. Sample header ...
How do I set the timeout period for HSF - Enterprise Distributed Application Service (EDAS) Documentation
Use the HSF tags methodSpecials and clientTimeout for configuration. methodSpecials: Sets the timeout time (unit: ms) for a single method. clientTimeout: Sets the unified timeout time (unit: ms) for all methods in the API. The timeout time settings are ...
How do I know that the software is safe to use? - Marketplace Documentation
All images are made based on Alibaba Cloud Security-enabled operating systems to ensure the safety of the ECS. The process strictly complies with Image Security Review Standard V1.0 and all images have passed the security auditing. Security assurance ...
How do I set the health check URL - Enterprise Distributed Application Service (EDAS) Documentation
When an application is published, the provided WAR file is automatically deployed in the Tomcat directory. Therefore, the WAR package name is added to the health check URL by default, and files in the WAR package must return the 200-400 HTTP code. For ...