无论如何都必须授权EFSF在二级市场上购买债券。
In any case, the EFSF must be authorised to make secondary-market bond purchases.
这可能会影响调试工作,因为授权脚本可能在某一天正常工作,而在第二天失败,但脚本本身却没有发生任何变化。
This can be a devil to debug because the authorization script may work one day and fail the next, and nothing in the script itself has changed.
在应用程序中,授权和身份验证是基础机制,对于自定义实现,丢弃二者是冒险的选择。
Authorization and authentication are fundamental mechanisms in an application, and discarding both for a custom implementation strikes us as a risky choice.
第一个特性是基于时间的授权机制,第二个特性是能够由其他宏和代码进行进一步扩展。
The first is a time-based authorization mechanism and the second is the ability to be further expanded by other macros and code.
第二层安全措施构建在传输上,因为使用的授权是在传输上提供的。
The second level builds on the transport security, because you use the authorization that is provided in the transport.
分析人员需要了解最初的声明式授权、通过编程形式授权的扩展和二者的交互。
An analyst will need to understand the initial declarative authorization, the extensions by programmatic authorization, and the interaction of the two.
而新的缓冲资本旨在向银行监管人提供第二个应对办法,即当聚会仍在火热进行时,授权他们端走大酒杯,或当经济衰退时,他们可以使酒杯满上。
The new capital buffer is intended to give bank supervisors a second tool: they can take away the punch bowl while the party is still in full swing or can top it up when the economy is slowing.
博伦博士二月份在《计算机科学杂志》刊发的一篇论文中描述了一种算法,该算法已授权给德文特资产市场使用,这是一家总部设在伦敦的对冲基金。
Dr Bollen's algorithm, which he described in a paper published in February in the Journal of Computational Science, has been licensed to Derwent Capital Markets, a hedge fund based in London.
重叠配置文件的使用可允许您为第二个用例构建授权模式。
It is this ability to use overlapping profiles that enables you to build an authorization scheme for the second use case.
当 –all添加到第二条命令之后,它会替换之前设置的授权,而不是添加权限。
When –all is added to the second command, it replaces the authorizations previously set rather than adding to them.
如果John向第二个基本节点或部署管理器单元提交作业,作业将失败,因为他的安全令牌在这两个环境中未获授权。
If John were to submit a job against the second base node or the deployment manager cell, the job will fail because his security token is not authorized in these two environments.
如果John要向部署管理器单元或第二个基本节点提交作业,作业将失败,因为John未获授权。
If John were to submit a job against the deployment manager cell or the second base node, the job will fail since John is not authorized.
在图12的相同用户注册中心示例中,John被授权为第一个基本节点的管理员,但没有获得第二个节点的授权。
In the same user registry example in Figure 12, John is authorized as administrator for the first base node, but is not authorized for the second node.
传说二:当你授权委任的时候,你就无法掌控任务和结果了。
Myth 2: When You Delegate, You Lose Control of a Task and Its outcome.
权限表示应用程序的原子二进制权限;操作是应用程序的命令,即要求授权的活动。
Permissions represent atomic binary permissions for an application and actions are the application's commands; that is, the activities that require authorization. In syntactic terms.
第二年,他获得了2.5亿美元的经费,这些钱都是在国会的秘密授权之下从五角大楼的预算剩余中抽调出来的。
The next year, he got a quarter of a billion dollars, all quietly siphoned out of leftover Pentagon budgets by secret Congressional authorization.
Mary被授权为第二个节点的配置员,但没有获得第一个节点的授权。
Mary is authorized as configurator for the second node, but is not authorized for the first node.
第二,将其同web应用程序脱离意味着您无需担心未授权的Web用户执行它。
Second, taking it out of the Web application means you won't have to worry about unauthorized Web users executing it.
Symbian平台在二月份基于EPL协议重新授权,不过一些工具代码依然保持在编写时的Symbian基金会授权协议。
The Symbian Platform itself was re-licensed under EPL in February though some tools code remains under the Symbian Foundation License at the time of writing.
公司利用这种独一无二的专利权为癌症患者进行昂贵的遗传药物治疗,这些治疗只能标价出售(美国境外的专利和授权条件则不同)。
The firm uses that exclusivity to create expensive genetic tests for cancer risk which only it offers for sale (the patents and licensing conditions are different outside the United States) .
10月15日,在一个获得苹果授权的论坛上,发布了一个帖子,专门讨论电池问题,两个星期后,帖子依然火爆——截止这周二,已累积了185页的评论。
A post on the Apple support forums, begun on October 15 to discuss battery problems, was still active Tuesday — two weeks and 185 pages worth of comments later.
“zero-day”保护机制的第二部分,是进行游戏授权保护。
The second part of this protection is making sure there is a license attached to each account, via server-side authentication.
投资银行工作者博锐说:“他们二人将钱用于未授权和违禁用途。”
"These men used our money for purposes that were never authorized and prohibited, " said Bray, who is an investment banker.
安全状况的第二个方面就是检测、减轻和挫败来自内部和外部两方面用户的未经授权的活动的一组技术方案。
The second aspect of a security posture is the set of technological solutions employed to detect, mitigate, and defeat unauthorized activity from both internal and external users.
授权需要第二次签字正确的安全权限。
Authorizing requires a second signature with correct security permissions.
修改可控:控制外发文件是否允许协作厂商对该文件进行二次编辑。未经授权,文件只能读取不能修改。
Modify control: control the outgoing file is allowed to co - operate the file for the two edit. Unauthorized, the file can only be read can not be modified.
修改可控:控制外发文件是否允许协作厂商对该文件进行二次编辑。未经授权,文件只能读取不能修改。
Modify control: control the outgoing file is allowed to co - operate the file for the two edit. Unauthorized, the file can only be read can not be modified.
应用推荐