目前基于策略网络管理的研究工作主要集中两个方面:策略规则研究,包括策略定义语言,冲突检测等研究工作;
At present, most researches on policy-based network management focuses on two aspects: policy rule research and policy-based network management system.
广告商必须调整他们的方法来接触这些受众,同时也必须调整他们的劝说策略来适应网络媒体。
Advertisers will have to adjust their methods to reach these audiences and will have to adapt their persuasive strategies to the online medium as well.
但一份来自气候策略的政策网络报告警告如果这个反对组织得逞了,欧盟将失去它得以达成新气候协议的最有力武器。
But a report from policy network climate Strategies warns that if the group succeeds, the EU will lose its most powerful weapon in the fight for a new climate treaty.
作为网络营销策略、搜索引擎优化考虑如何搜索引擎工作和人们在搜寻什么。
As an Internet marketing strategy, SEO considers how search engines work and what people search for.
因此即使你的网络广告很有策略和效果,搜索引擎的影响可能还是最小的。
So even if you were taking that strategy and working with AD networks, the impact of what search was driving would be minimal.
安全扫描是公司网络安全策略重要的一部分。
Security scans are an important part of the network security strategy for a company.
过去的二十年间,研究人员探究了若干种二选一策略,从神经网络到基于优秀选手的建议而建立的法则,但结果仍是一样。
In the past two decades researchers have explored several alternative strategies, from neural networks to general rules based on advice from expert players, with indifferent results.
由于我们把创建社会网络的策略安排在2010年的日程中,所以我们必须同心协力快速开展社会营销活动。
Sincebuilding our social networking tactics was still on the “to do” listfor 2010, we had to pull together a social marketing campaign on thefly.
他们可能是书籍或者网络站点上描述最佳实践和设计策略的一段。
These might be sections of books or Web sites that describe best practices and design strategies.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
你要注意这个数字,因为订阅用户是网络营销增长策略的一个至关重要的元素。
You'll want to pay attention to this, as subscribers are a vital element of an online marketing growth strategy.
同样,这是将安全策略嵌入物理网络设计中的一种实践。
Once again, this is the practice of embedding security policy into the physical network design.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
The trusted device network approach provides an organization with a higher level of control over critical system access.
“如果这两个竞选班子在怎样取得(网络策略)方面有差别的话,其中很多差别是在选民方面,”道尔说。
"If there is a difference in how the two campaigns approached [a Web strategy], a lot of those differences were based on our constituencies," Daou says.
在物理网络层控制路由需要将策略嵌入到拓扑中。
Controlling routing at the physical network layer embeds policy into topology.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
这种方法的问题在于,它迫使我们将授权策略嵌入物理网络。
The problem with this is that it forces us to embed the authorization policy into the physical network.
这些服务网格使参与公司可以形成松散的联盟,每个公司具有自己的内部计算机、网络以及安全基础结构和策略。
The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.
在网络资源管理中使用基于策略的管理,可以简化管理。
Policy based management is used in Network Resource management and makes it easier.
答案是那是激进的的策略是在同一个网络中销售多个品牌的手机,这改变了KPN在比利时业务的状况,继而在德国的情况也得到改变。
The answer was the then-radical policy of selling multiple mobile brands on one network, which transformed KPN's prospects in Belgium and then Germany.
对虚拟机之间通信所用的内部虚拟网络的控制不够明确,难以实施安全策略。
Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.
另外,例如网络拓扑以及安全策略会进一步使得配置及开发gdd工具变得更复杂。
Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools.
如果没有统一的策略,开发人员就要为每个网络应用程序重复实现定制的安全机制。
Without a unified strategy, developers re-implement custom security for each network application.
网络管理者在资源仓库里对更新的策略进行编辑和储存。
A network manager edits and stores updated policies in the repository.
因此,您可以利用多个IBMCloud数据中心,作为一个最小化网络延迟策略的一部分。
You may therefore be able to leverage multiple IBM Cloud data centers as part of a strategy to minimize network latency.
然而在那之后,苹果为了能通过更多的手机网络在全球销售iPhone,便放弃了这种策略。
Since then, however, it has abandoned this strategy in order to sell iPhones through many more mobile phone networks across the world.
相同的策略可应用于通过网络服务提供的其他服务,比如数据库、web服务器、LDAP 服务器,等等。
The same strategy can be applied to other services that are available via network services, such as databases, web servers, LDAP servers, and so on.
同样,像Alex Iskold提到的那样,iPhone是一个可能扩大苹果公司影响力领域的策略,从网络浏览到社交网络甚至可能是搜索。
Also, as Alex Iskold noted, the iPhone is a strategy that may expand Apple's sphere of influence, from web browsing to social networking and even possibly search.
同样,像Alex Iskold提到的那样,iPhone是一个可能扩大苹果公司影响力领域的策略,从网络浏览到社交网络甚至可能是搜索。
Also, as Alex Iskold noted, the iPhone is a strategy that may expand Apple's sphere of influence, from web browsing to social networking and even possibly search.
应用推荐