结构性弱点将延续下来。
众所周知的是Groupon商业模式的结构性弱点,即竞争对手进入的门槛很低。
Well known is the structural weakness in Groupon's business model, being the "low cost of entry" for competitors.
实验表明,通过使用该扫描器,用户可以不留痕迹地发现一台本地或远程服务器的安全性弱点。
Experiments show that users can find security vulnerabilities of a local or remote server using this scanner.
许多生物辨识系统的安全性弱点评估应该被进行,并且应该让可能的使用者得以公开取得评估的结果。
Vulnerability evaluation of various biometric systems should be conducted and its results should be available to potential users.
本文首先简单介绍了常用的生物特征识别技术,分析了目前通用的利用生物特征识别进行身份认证的方案中存在的安全性弱点。
In this thesis, the author first briefly reviews the general biometric recognition technology and analyzes the weak points in a biometric recognition-based authentication system.
当然,魔鬼存在与细节.当Twiter连接到一个电子商务系统时,如何判断tweets的权威性,是twitter的一个弱点.但是,就像Twitter一再重申的那样:如果他们打算做广告,那他们希望广告是有吸引力的.上个月, Biz Stone说道:利用有意义并且相关的方式,便捷的将商务信息和个人联系起来是Twitter必须做到的.
Of course, the devil is in the details here. Maintaining the authenticity of tweets when they’re connected to an e-commerce system could be delicate.
所以这个领域的每个人都试着向前看,根据自己机构的长处和弱点,来决定应该追求何种,小的分目标和可能性。
So everyone in this field is trying to look ahead And decide even the strengths and weaknesses of Their organization what small subsets of the entire Range of possibilities should they pursue.
这其中的原因不只是全球性的经济危机,其实还包括西班牙自身的经济弱点。
That is because Spain’s problems stem not just from the global crisis, but from weaknesses at home.
并且为了证明这一点,两个学术性间谍组织已经在演示无论理论怎么说,在实际的尝试中,用这种方式来隐藏信息仍然是有弱点的。
And to prove the point, two groups of academic spies have now shown that whatever the theory says, practical attempts to hide messages this way can still be vulnerable.
XML专家认识到了用上述这种非正式描述提供语义透明性的弱点。
XML experts usually recognize the weakness of informal descriptions like those described above for providing semantic transparency.
最大的弱点是安全性;没有投入任何精力来保护这些程序不受最常见入侵的危害。
The weakest point is security; no real effort has gone into making these programs secure against any but the most casual intruders.
老模式的最致命的弱点是它对于信贷扩张的依赖性。
The fatal weakness of the old model was its reliance on rapid credit growth.
最近阿盟的会议就充分展示了阿拉伯的弱点,他们还在争取,甚至还开始讨论召开一个“紧急会议”的最终可能性。
Arab weakness was on display most tellingly at a recent meeting of the Arab League, which struggled even to begin discussing the eventual possibility of an "emergency summit".
许多中国人一度对美国的一切事物不假思索地崇拜,如今则用一种更加细致、更带批判性的目光来审视美国的种种弱点,某些人的态度甚至近乎蔑视。
The automatic admiration for all things American that many Chinese once felt has given way to a much more nuanced and critical view of US weaknesses - verging, for some, on contempt.
在流感大流行的挑战性条件下评估《国际卫生条例》的绩效,就有可能揭示具体的优势和弱点。
When the performance of the IHR is assessed under the challenging conditions of an influenza pandemic, specific strengths and weaknesses are likely to come to light.
这可以意味着研究人员可以采取针对性措施的癌细胞另外一个弱点。
And that might suggest another vulnerability that could be targeted by cancer researchers.
老年人有长处,但也有很大的弱点——老年人容易固执,因此老年人也要有点自觉性。
Old people have strengths but also great weaknesses-they are easy to be stubborn, for example-and they should be aware of that.
威胁和弱点在机密性、完整性和可用性中是分级的。
Threats and vulnerabilities are classified under confidentiality, integrity, and availability.
流动性已成为了常春藤联盟模式的致命弱点。
Liquidity turned out to be the Achilles' heel of the Ivy League model.
她在《弱点》中饰演一位个性好强的南方女性,收留了一个无家可归的十几岁孩子。这一角色一早便替她夺得了金球奖,如今,她俨然又成了小金人的领跑者。
Her role in the Blind Side as a feisty Southern woman who takes in a homeless teenager has already won her a Golden Globe, and she is the Oscar frontrunner.
最后,与软件相关的每个人都有责任关注安全性,并试图减少脆弱点。
In the end, it is the responsibility of everyone associated with a piece of software to keep security a focus and to try to mitigate vulnerabilities.
这二个关键性的弱点本身就足以使得该论述缺乏可信度。
These two critical weaknesses alone make the argument unconvincing.
无论如何,iPhone4天线问题的结论是:它存在一个弱点,但没有证据说明这个问题实际上很严重,更不用说灾难性了。
Anyway, bottom line on the iPhone 4 antenna: it has a weak spot but there's no evidence that it's a significant, let alone catastrophic, problem in practice.
reflectedXSS攻击利用了Web应用程序安全性低的弱点,该应用程序在浏览器中显示输入参数而不对其中是否存在活动内容进行检查。
A reflected XSS attack exploits vulnerable Web applications that display input parameters back to the browser without checking for the presence of active content in them.
有效的安全性管理保护所有的IT资产,以减小安全性、弱点及事件的业务影响。
Effective security management protects all it assets to minimize the business impact of security, vulnerabilities and incidents. Some examples of detailed control objectives are.
老年人有长处,但也有很大的弱点,老年人容易固执,因此老年人也要有点自觉性。
Old people have strengths but also great weakness---they tend to be stubborn, for example---and they should be aware of that.
老年人有长处,但也有很大的弱点,老年人容易固执,因此老年人也要有点自觉性。
Old people have strengths but also great weakness---they tend to be stubborn, for example---and they should be aware of that.
应用推荐