同时,用打电话多少与距离远近订价的方式也会一去不复返,不久的将来许多电话用户很可能只需每月支付一笔额定的接入费,就可以无限制的打电话或传输数据了。
Meanwhile, distance and voice-based pricing are going away too, so that before long many subscribers will probably pay a fixed monthly access fee for unlimited phone calls and data transfers.
如果单个存储器端口或服务器端口失败,服务器还有一条路径用于数据传输。
If a single storage port or server port fails, the server still has another path for data transfer.
在经典的设计中,这些方法中的值对象或数据传输对象用作方法参数并在需要复杂对象时返回值。
In a classic design, value objects or data transfer objects in those methods are used as method parameters and return values when complex objects are required.
在传输或存储时的数据安全是讨论中一个非常重要的部分。
Security for data while in transit or in storage is a very important part of the discussion.
如果您的系统要使用XML在内部或外部传输数据信息,那么您应认真地考虑如何正确地设计XML模式。
If your system is going to use XML to transport data information, either internally or externally, then you should seriously consider how to properly design your XML schemas.
所传输的数据采用普通文本形式,因此,可以具有许多不同的格式,比如XML、HTML、JSON,或仅仅是文本。
This transmitted data is plain text and, therefore, can be in a number of different formats, such as XML, HTML, JSON, or just plain text.
第二代,或2G,引入数字传输,首次可以提供数据支持,尽管焦点依然是语音传输。
The second generation, or 2G, introduced digital transmissions and offered the first support for data, although the focus was still on voice calling.
流量分析即通过监测通信方以及传输的数据量来收集关于消息或协议的信息。
Traffic analysis attacks attempt to glean information about a message or protocol by observing which parties are talking to whom, and in some cases how much data is being transferred.
专用模型的优点之一在于,所监视的Web服务可以在企业中的 Intranet 上或封闭的网络中传输敏感数据,从而跳过网格。
One benefit of the dedicated model is that the Web services being monitored can transport sensitive data on an intranet or in a closed network within an enterprise, skipping the grid.
RESTful编程依靠网络传输层(通常是HTTP)的规则和惯例以及一些众所周知的数据格式(通常是 XML或JSON)。
RESTful programming relies on the rules and conventions of the network transport level (usually HTTP) and some well-known data formats (usually XML or JSON).
设备驱动程序使用这些例程来请求各种类型的数据传输(control、interrupt、bulk或isochronous)。
Device drivers use these routines to request various types of data transfers (control, interrupt, bulk, or isochronous).
即使数据不是敏感数据或个人数据,在云中传输和操纵数据时也应该用密码技术加以保护。
Even if the data is not sensitive or personal, it should be secured with cryptography when transported to and from, and manipulated in, the cloud.
消息传递桥接模式将数据从一个传输机制映射到另一个传输机制,无需修改消息有效负载的格式或内容。
The messaging bridge pattern maps data from one transport mechanism to another without modifying the format or content of the message payload.
数据操作服务是处理逻辑,其直接操作数据值和那些值的表示形式,以便进行存储、传输或表示。
Data manipulation services are processing logic that directly manipulates data values and the representation of those values for storage, transport or presentation purposes.
网络流量由IP信息包(或,简称信息包)—以流的形式从源系统传输到目的地系统的一些小块数据—组成。
Network traffic is made up of IP packets or simply packets — small chunks of data traveling in streams from a source system to a destination system.
如果你运营着一个旅行网站或一个银行网站,你能使用这种管道来给你的用户传输结构化数据——例如行程单或交易报告。
If you're running a travel site, or a bank, you can use that pipeline to transmit structured data to your users - for example, itineraries or transaction reports.
应用程序数据部分包含所有实际消息数据(有效负载)和任何附加头,比如传输头或IMS信息头。
The application data section contains all actual message data (payload) and any additional headers, such as the transmission header or the IMS information header.
脱机数据传输是简单地利用电话或类似的链路来传输数据,不包括计算机系统。
Off-line data transmission is simply the use of a telephone or similar link to transmit data without involving a computer system.
如果您的应用系统是在公司和银行之间传输财务数据的后端系统,那么,您的用户可能是一些公司的内部部门或银行。
If your application is a back-end system for transferring financial data between your company and a bank, then your user is probably some internal group in your company or the bank.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
它们旨在保护数据在传输过程中不被查看、修改或攻击。
They aim to protect the data from being viewed, modified, or hacked while in transit.
我们使用其保证数据的安全,尤其是传输或存储数据时,以及在数据容易被窥探的时候。
We use them to keep data safe, especially when transferring or storing data, times when data is particularly susceptible to prying eyes.
域并不定义传输哪些数据,而仅仅定义数据传输时经过的路径或路线。
The domain does not define what data will be transferred, just the paths or routes along which the data will flow.
如果应用程序和服务等待通过网络传输的数据,或者客户机无法连接它们或接收信息,就需要解决这些问题。
If different applications and services are waiting for data over the network, or your clients are having trouble connecting or receiving the information, then you need to address these issues.
报告进一步指出:“如此级别的侵入可对特定用户或网站进行监督,能够破坏数据的传输,阻止用户访问网站,甚至在用户不同意的情况下改变数据的流向。”
From the report: "This level of access could enable surveillance of specific users or sites." It could disrupt a data transaction and prevent a user from establishing a connection with a site.
在所有情况下,都要寻找比较高的错误数据包、重新传输或丢失数据包传输数量,这些都说明网络忙。
In all cases, you are looking for a high level of error packets, retransmissions, or dropped packet transmission, all of which indicate that the network is busy.
SCSI命令涉及到用于向 SCSI 设备传输数据(或从中输出数据)的数据命令,以及用于设置 SCSI 设备的配置参数的非数据命令。
The SCSI commands involve data commands that are used for transferring data from or to SCSI devices and non-data commands that request or set the configure parameters of a SCSI device.
数据安全性、许可限制或行业规则限制了数据传输。
Data security, licensing restrictions, or industry regulations restrict data movement.
如果与传输或接收的数据包相比错误率很高,可能说明网络硬件有问题。
If the error rate is excessively high compared to the packets transmitted or received, then it may indicate a fault with the network hardware.
SCO数据包总是在规定时隙中以固定的周期(每2,4,或6时隙)进行传输。
SCO packets are always transmitted in defined time slots, at regular intervals (every 2, 4, or 6 slots).
应用推荐