所以,遵循网络规则,他们发起了一场公投包含很多非常高雅、深刻、有内涵的名字。
So, in true web fashion they put together a poll where they had a bunch of very erudite, very thoughtful, cultured names.
许多网络公司忘记了一条电子商务的基本规则:网络购物者希望尽可能少的麻烦。
Many web companies forget one cardinal rule of e-commerce: Web shoppers want as little hassle as possible.
如果您的公司现在还没有制定一项社会媒体政策以及在多个网络之间沟通交流的具体规则,那么它可能明年就会采取这样的举措。
If the company you work for doesn't already have a social media policy in place with specific rules of engagement across multiple networks, it just might in the next year.
我们添加一个规则使它们可以写_,从而允许发送网络包。
We add a rule to allow them to write _ so as to allow sending network packets.
您可以定制自己的规则来满足您的特定需求,从而只允许您想要的网络流量进入系统。
You can make your own rules that suit your specific needs to allow only the network traffic you want into your system.
这些规则指定消息发送的顺序、每条消息的格式以及对网络通信应用加密算法的方式。
These rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.
极客们用掉大量的网络资源,总是试图在规则之外行事,给运营商的技术支持部门制造大量的问题。
Geeks use up a lot of network resources, try to find ways around rules, and create problems for tech support.
社会公约,例如链接到有价值资源的激励,或者是在某个社交网络中的约会规则,都和人们喜欢做什么,以及能做什么的社会约定密切相关。
Social conventions, such as the incentive to make links to valuable resources, or the rules of engagement in a social networking web site, are about how people like to, and are allowed to, interact.
我们首先创建限制对管理网络的管理访问的规则。
Let's begin by adding the rules to restrict administrative accesses to the administration network only.
也可以从网络中其他计算机访问客户端。因此要设定新的固件规则。
You can also access the guest from other computers on your network, so you may want to set up new firewall rules.
网络延迟:对规则服务的远程调用伴随而来的是网络延迟问题。
Network latency: With remote invocation of the rule services comes the issue of network latency.
我们续写了网络的新规则。
其他的可能使得工具部署复杂化的因素是公司的网络结构及安全规则。
Additional factors that can complicate the deployment of tools are the company's network structure and security policies.
李纳斯是在网络普及成为可能之后,读懂游戏规则的第一人。
Linus was the first person who learned how to play by the new rules that pervasive Internet access made possible.
高度不均衡的网络与其他网络的动态形态是不同的,其中之一是连接节点之间的组织规则是“优先连接”。
Highly unequal networks have different dynamics than other networks, one of which is a "preferential attachment" rule for organizing links between nodes.
网络行为的匿名性,隐形性以及幻想成分鼓励我们认为通行的规则并不适用。
The anonymity, invisibility and fantasy elements of online activities encourage us to think that the usual rules don't apply.
他们表示,在大多数情况下,网络作者有自己的潜规则,这一点让老师和家长们担忧。
Often, they argue, writers on the Internet employ a cryptic argot that vexes teachers and parents.
他说,防务企业丢失机密技术信息,更有可能是由于网络犯罪,而非宽松应用出口管制规则。
He said defence companies were more likely to lose secret technical information as a result of cyber crime than the lax application of export control rules.
比如最近他就表示,应用程序市场对互联网自由造成的威胁,甚至比网络中立性规则造成的更大也更直接。
Most recently, he argued the app market poses a bigger, more immediate threat to Internet freedom than net neutrality regulation.
许多游戏的规则已经制定出来,但是没有一个国家可以单独地只玩自己的那套战略,就象我讲的故事里的第一个孩子那样。相反,要像第二个孩子玩的那种网络游戏。
Many of the rules have already been established, but no country will be able to play alone with their own strategies, like the first child in my story did.
服务的规则实施点通常体现为嵌入式代理或网络媒介,比如XML网关。
This enforcement point for services usually takes the form of an embedded agent or a network intermediary such as an XML gateway.
然而,网络并没有加强媒体之前的所有者架构和信息的分配规则,而是像它一贯的那样慢慢削弱了这些因素。
But instead of reinforcing the previous structures of media ownership and information distribution, the network has consistently undermined them.
首先,为了避免网络开销并强制遵守业务规则,几乎总是通过会话bean访问实体bean。
First, to avoid network overhead and force adherence to business rules, entity beans are almost always accessed through a session bean.
RESTful编程依靠网络传输层(通常是HTTP)的规则和惯例以及一些众所周知的数据格式(通常是 XML或JSON)。
RESTful programming relies on the rules and conventions of the network transport level (usually HTTP) and some well-known data formats (usually XML or JSON).
虽然配置是关于Snort如何操作的更加一般化的规则集,但在包每次跨过所监视的网络接口时,规则将告诉Snort执行什么操作。
While configuration is a more general set of rules about how Snort should operate, rules tell Snort what to do every time a packet comes across a network interface that Snort monitors.
如,数据库要求网络ID长度不超过8个字符,但是,我们也会加强我们的业务规则,要求网络ID的长度必须不小于6位字符。
For example, the database requires that network IDs not exceed eight characters in length, but we'll also enforce our business rule that a network ID must be no fewer than six characters in length.
在虚拟空间里,这个规则意味着你不能规划一个庞大的计算机网络攻击,即使是一个军事网络,也不能够排除民用网络受到牵连。
In the cyberworld, this rule means you couldn't plan a massive computer attack, even on a military network, without regard for the civilian computer networks that would be affected by that attack.
理论3.以那些接受到最新教育的人为基础,他们懂得网络不是另一种媒体。 不运用任何旧的营销规则。
MYTH 3 builds on the newly-educated person who understands that the web is not just another medium, and that none of the old marketing rules apply.
尽管大家认为,有朝一日,这个新的规则能够使得整个网络成为一个离线应用工具,但现实是,大多数开发者需要将这个技术应用到他们的各项产品中去。
While it's believed that one day this spec could make the whole web an offline app, the reality is that most developers have yet to implement this technology in their services yet.
给出定义和评判规则很难,这不仅仅是因为战争工具已经改变,还因为网络空间让这些工具落入更广泛人群手中。
Definitions and rules are hard not just because the tools of war have changed, but because cyberspace puts them into the hands of a broader group of people.
应用推荐