基于主机的入侵防护系统(HIPS)技术保护网络边界…
Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .
它也运行网络边界的一个重要的缓存功能——缓存静态内容——如,图像。
It also performs an important caching function - caching static content - such as images, closer to the edge of the network.
EdgeNet working允许您轻松地使用自然语言发现这些设备,并且允许跨传统网络边界对这些设备进行入站连接。
Edge Networking allows these devices to be easily discovered using natural language and allows inbound connections to these devices across traditional network boundaries.
当企业为了安全和治理已经在其网络边界成功部署SOA网关之后,那么基于相同的考虑将它转入内部网络就成了自然而然的事了。
As enterprises successfully deployed SOA Gateways at the edge of their networks for security and governance, it was a natural transition into the Intranet for the same purposes.
近些年来,随着各企业与供应商、客户和业务合作伙伴的联系日益紧密,网络边界逐渐消失,外部和内部威胁的概念日渐融为一体。
In recent years, as organizations have linked with suppliers, customers, and business partners, the network perimeter has dissolved and the notion of external versus internal threats has blurred.
现在他们已经越过阿富汗边界进入巴基斯坦,但他们在该地区保持了与其他极端主义组织建立的网络。
They have now moved over the border of Afghanistan and they are in Pakistan now, but they continue to have networks with other extremist organizations in that region.
他们的支持网络已遍及全球,并且不受国家边界的约束。
Their support networks have global reach and are not contained by national borders.
对他们来说,独家内容协议向几乎没有边界、每个人依照同样的规则行事的网络世界的反方向跨了一大步。
To them, exclusive content deals are another big step away from an online world with few borders, where everybody plays according to the same rules.
“正如我们所知道的,社交网络几乎没有边界,而现在,美国失踪人员应急响应警告将会从中受益,”美国司法部国家失踪人员应急响应助理,劳里·罗宾逊说。
"As we all know, social networking has few boundaries, and now AMBER Alerts will benefit from that reach," said Laurie Robinson, the National AMBER Coordinator for the Department of Justice.
大多数边界是很明显的:网络连接、进程与进程的通信、文件系统、操作系统接口等等,但是有些边界就不好辨别。
Most boundaries are obvious: network connections, process-to-process communication, file systems, operating system interfaces, and so on, but some boundaries are more subtle.
网络的价值会随着更多人的使用而上升,本身也会随之扩展边界。
A network's value increases as more people use it and it expands in reach.
缓存代理解决方案服务-在LSID中相当于HTTP中的代理-是一个位于网络(实验室、部门、组织等)边界上的服务器,来代理所有的LSID传输。
The Caching proxy Resolution Service — the LSID analogue of an HTTP proxy — is a server that sits on the edge of a network (lab, department, organization, etc.), and proxies all LSID traffic.
一经触发,该网络会将那个不协调的音符归于带有明显边界的另外的片段中。
Once activated, that region partitions the deviant chord as a different segment with distinct boundaries.
他补充说,这是网络增长一个很严重的边界。
He added that this was a "serious boundary" to online growth that should be removed.
它是Web平台协作的第一个套件,也是连接组织边界外不同组织的人员的社会网络套件。
It is the first suite of Web-platform collaboration and social networking suite connecting people from different organizations outside organizational boundaries.
IP在底层物理网络的边界之间提供最基本的数据报传递形式。
IP provides the most basic form of datagram delivery across the boundaries of the underlying physical networks.
近年来,内部网络和外部网络的边界变得模糊。
The boundary between the internal and external network has blurred over the years.
但是,就算我们都同意内部网络不能完全信任,但我们知道内部网络的确切边界吗?
But even if we agree that we don't trust the internal network, do we know exactly where the internal network ends?
一个解决方案是通过隔离的网络从其他数据发出边界网关协议更新信息,但是这是不切实际的,因为其必须建立一个影子互联网。
One solution is to send BGP updates via a separate network from other data, but this is impractical as it would essentially involve building a shadow Internet.
本程序应用多端口网络方程和故障端口边界方程联立求解的方法,计算电力系统各种多重故障及任意不对称运行的电压和电流。
In this program the voltage and current of simultaneous faults or unbalanced power system are calculated by solving the simultaneous equations of multi-port network and of the fault boundary.
观念和观念之间的互相表征,使观念成为一个网络,任何一个观念都没有明确的边界。
Idea with the mutual token of the idea, make the idea become a network, the whichever idea all has no clear and definite boundary.
本文用双隐层BP人工神经网络建立了丝杆螺母副表面边界膜温度特性的磨损自补偿数学模型。
The BP neural network used in the temperature characteristic of the boundary film on the screw-nut pairs surface in the wear-self-compensation system was established.
此外,开源电话软件可以被用来作为网关或会话边界控制器,提供基于网络的转换服务。
Further, the open source telephony software can be used as a gateway or session border controller to provide network-based transcoding services.
因此,网络空间是在许多方面,一个蛮荒的边界。
Therefore, the cyberspace is in many ways, an untamed frontier.
网络时代的到来使企业内部管理及信息传递的成本降低,企业的边界大大地拓展。
The coming of Internet era lowers the cost of management and information transmission and enlarges the boundary of enterprises.
提出一种利用传感器网络精细电子地图定位建立信息安全边界的方法。
This paper proposes a fine-grained radio-map localization based information security boundary in sensor network.
哈卡尼网络的基地在巴基斯坦的北瓦济里斯坦省,这是沿着阿富汗边界的一个部落区域。
The Haqqani network is based in Pakistan's North Waziristan province, a tribal area along the border with Afghanistan.
哈卡尼网络的基地在巴基斯坦的北瓦济里斯坦省,这是沿着阿富汗边界的一个部落区域。
The Haqqani network is based in Pakistan's North Waziristan province, a tribal area along the border with Afghanistan.
应用推荐