然而,我们认识到个人访问苏州并不总是实际的或可能的。
However, we realize that personal visits to Suzhou aren't always practical or possible.
举个例子,如果今天有100个人访问你的着陆页,其中的20个人注册了,那么你的转化率为20%。
For example, if 100 people visit your landing page today and 20 of those people register then you have a conversion rate of 20%.
最初我们不会发送该信息,因此必须告诉ApplicationServer我们正在保护的URL应该允许每一个人访问。
We will not be sending this information initially, so we must tell the Application Server that the URL we just protected should be allowed access from everyone.
该组研究对象中的226人依然在世,其中161人在研究中仍处于活动状态,即每两年回答一份调查问卷,并在每15年接受一次个人访问。
Of this group, 226 are alive and 161 are still active in the study, which requires the men to answer questionnaires every two years and to be interviewed personally every 15 years.
通过定期的区域教育、大型年度会议、个人农场参观和数千次电话访问,Amburgh 家族传递着牧场管理的原则。
Through regular regional educational meetings, a large annual meeting, individual farm visits and thousands of phone calls, the Amburghs pass on the principles of pasture management.
在科学家的实验室里,每个人分别在上午的两次访问中,以平均速度走了一个小时,理论上,他的身体应该主要依靠脂肪作为燃料。
On two separate morning visits to the scientists' lab, each man walked for an hour at an average speed that, in theory, should allow his body to rely mainly on fat for fuel.
其他一些公司正在更进一步地推进数字人类,他们提供自由访问的平台给组织和个人,让他们自己在上面创造数字人类。
Some other companies are taking their digital beings a step further, enabling organizations and individuals to create digital humans themselves using free-access platforms they provide.
人力资源部之外的其他员工只能访问他们的个人HR信息。
Employees outside the HR department only have access to their individual HR information.
苹果没有访问过用户个人的地点历史信息文件,苹果公司说,但是很多用户认为苹果干过。
Apple does not have access to individual location data in that file, the company says, but many users were concerned that it even existed.
这也使人们更容易改变其设置,用来管理访问个人信息的应用程序。
It also makes it easier for people to change the Settings that govern the apps' access to personal information.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在XSLT出现之前,更改网站显示是一项重要任务:有一个人必须重新访问并更改站点上的每一个页面。
Prior to XSLT, changing the presentation of a Web site was a major undertaking: one had to revisit and to change every page on the site.
此前不需要设置的密码现在需要传递到JSSE,以便它访问您的个人证书,这也是前面指定密码的原因。
The password that was not required to be set before will now need to be passed to the JSSE in order for it to access your personal certificate, which is why it was specified earlier.
我个人倾向于将所有的数据访问逻辑封装到这个类中。
Personally I like the idea of keeping all the data access logic encapsulated in that class.
三分之二的活跃互联网用户会管理自己的个人网络档案,而71.1%访问过好友的社交网络页面。
Two-thirds of active Internet users have managed an online profile and 71.1% have visited a friend's social network page.
如果这个输入框填写了内容,系统会访问顾客的个人档案,系统会提前查找所需的信息。
If this field is filled in, the system will access the customer's rental profile, which the system will retain to pre-populate any required information.
portlet是可视的窗口,它将不同来源的内容组织到单独的界面供个人或群组访问。
Portlets are visual Windows that organize content from different sources into a single interface for individual or group access.
ActivityLogging记录由个人、数据库和访问协议产生的用户活动。
Activity Logging records user activity by person, database, and access protocol.
例如,只有该名去世用户的好友才能继续访问其个人简介页面或者通过Facebook的公共搜索找到这些资料。
For instance, only that user's friends can still visit the profile or find it in Facebook's public search tool.
操作系统和应用将不再只运行在员工的个人电脑上而是可以远程访问的数据中心的虚拟机上,理论上就可以用世界上任何一台个人电脑来访问。
Operating systems and applications will no longer run only on the employee's PC but on a virtual machine in a data centre that can be accessed remotely, theoretically from any PC in the world.
这个安全策略授权每一个人都可以访问项目。
This security policy grants access to every user for every project.
它们的分配和计划通常不正确或不恰当,从而让个人得以访问不应该访问的服务器位置或应用程序。
Often, they are incorrectly assigned or not properly planned, allowing individuals access to parts of the server or application they should not have.
在一个门户网站,您可以建立单点登录,或者对信息、应用程序、流程和人的访问进行个人化和控制。
On a portal, you can establish a single sign-on, or personalize and control your access to information, applications, processes, and people.
然而,就本文的目的而言,以及为了确保每个人都有访问这些资源的同等能力,这些表格省略了商业化的工具。
However, for the purpose of this article and to ensure that everyone has equal access to these support resources, commercial tools are omitted from these tables.
在一家“专家网络”公司里,提供情报的人可能是在你所感兴趣的那家公司里工作的某个人,所以你需支付访问费。
In an expert network, the informant could be someone working inside a company that you're interested in, so you pay for access. Just like the cops.
如果我们能够有效地控制对每个人的信息的访问,那么具有健壮且灵活的会话管理和用户管理会使实现更容易。
If we were to be able to effectively control access to the information for each persona, having robust and flexible session and user management would make our implementation easier.
不易访问的技术妨碍个人快速并简单地获取及使用信息的能力。
Inaccessible technology interferes with an individual's ability to obtain and use information quickly and easily.
正如隐私政策限制了公司对你的个人数据的处理,一纸移动数据政策可以限制用户对它们储存在公司里的个人数据的访问和转移。
Whereas a privacy policy discloses what a company can do with your data, a portability policy discloses how a user can access and transfer their own data once it's stored with that company.
在一家“专家网络”公司里,提供情报的人可能是在你所感兴趣的那家公司里工作的某个人,所以你需支付访问费。
In an expert network, the informant could be someone working inside a company that you're interested in, so you pay for access.
在一家“专家网络”公司里,提供情报的人可能是在你所感兴趣的那家公司里工作的某个人,所以你需支付访问费。
In an expert network, the informant could be someone working inside a company that you're interested in, so you pay for access.
应用推荐