网络策略设置也可以阻止您完成此过程。
Network policy Settings may also prevent you from completing this procedure.
公司可以帮助企业确定并建立目标网络策略。
We can help define and build a targeted Internet strategy that is specific to your business and web site.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
The trusted device network approach provides an organization with a higher level of control over critical system access.
这将被用来确定网络策略-路线,班次,机型和飞机以及其他因素的能力。
This will be used to determine the network strategy - routes, frequency, aircraft type and aircraft capacity among other factors.
接下的2天里我们会呆在惠普公司,讨论它的网络策略以及预见其未来在网络市场的机遇。
We're spending the next two days at Hewlett-Packard, discussing its networking strategy and the changes it sees in the networking market.
目前他在思考用于Veedow.com、Wishpot和Ilikeucoz.com的网络策略。
Currently contemplating his web strategies for Veedow.com, Wishpot and Ilikeucoz.com.
“如果这两个竞选班子在怎样取得(网络策略)方面有差别的话,其中很多差别是在选民方面,”道尔说。
"If there is a difference in how the two campaigns approached [a Web strategy], a lot of those differences were based on our constituencies," Daou says.
现今的网络策略要求网站主,设计师和开发者考虑到提供给用户的不仅仅是内容,更应该是整体体验。
Today's online strategies require that website owners, designers and developers consider the overall experience delivered to users and not just the content, " the report states."
广告商必须调整他们的方法来接触这些受众,同时也必须调整他们的劝说策略来适应网络媒体。
Advertisers will have to adjust their methods to reach these audiences and will have to adapt their persuasive strategies to the online medium as well.
但一份来自气候策略的政策网络报告警告如果这个反对组织得逞了,欧盟将失去它得以达成新气候协议的最有力武器。
But a report from policy network climate Strategies warns that if the group succeeds, the EU will lose its most powerful weapon in the fight for a new climate treaty.
作为网络营销策略、搜索引擎优化考虑如何搜索引擎工作和人们在搜寻什么。
As an Internet marketing strategy, SEO considers how search engines work and what people search for.
因此即使你的网络广告很有策略和效果,搜索引擎的影响可能还是最小的。
So even if you were taking that strategy and working with AD networks, the impact of what search was driving would be minimal.
安全扫描是公司网络安全策略重要的一部分。
Security scans are an important part of the network security strategy for a company.
过去的二十年间,研究人员探究了若干种二选一策略,从神经网络到基于优秀选手的建议而建立的法则,但结果仍是一样。
In the past two decades researchers have explored several alternative strategies, from neural networks to general rules based on advice from expert players, with indifferent results.
由于我们把创建社会网络的策略安排在2010年的日程中,所以我们必须同心协力快速开展社会营销活动。
Sincebuilding our social networking tactics was still on the “to do” listfor 2010, we had to pull together a social marketing campaign on thefly.
他们可能是书籍或者网络站点上描述最佳实践和设计策略的一段。
These might be sections of books or Web sites that describe best practices and design strategies.
这种保护策略允许更高的网络吞吐量,代价是牺牲部分网络安全性。
While this protection strategy allows higher network throughput, it does so at the cost of some network security.
对于云交付模型,使用者对部署的应用程序、操作系统、硬件、软件、存储和网络的控制能力不同,这会影响云安全策略。
It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.
你要注意这个数字,因为订阅用户是网络营销增长策略的一个至关重要的元素。
You'll want to pay attention to this, as subscribers are a vital element of an online marketing growth strategy.
同样,这是将安全策略嵌入物理网络设计中的一种实践。
Once again, this is the practice of embedding security policy into the physical network design.
在物理网络层控制路由需要将策略嵌入到拓扑中。
Controlling routing at the physical network layer embeds policy into topology.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
Information gathered by social network applications needs to be protected by policies which control access to information.
这种方法的问题在于,它迫使我们将授权策略嵌入物理网络。
The problem with this is that it forces us to embed the authorization policy into the physical network.
这些服务网格使参与公司可以形成松散的联盟,每个公司具有自己的内部计算机、网络以及安全基础结构和策略。
The service grid lets participating companies act as a loose federation, each with its own internal computer, network, and security infrastructure and policies.
在网络资源管理中使用基于策略的管理,可以简化管理。
Policy based management is used in Network Resource management and makes it easier.
对虚拟机之间通信所用的内部虚拟网络的控制不够明确,难以实施安全策略。
Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.
另外,例如网络拓扑以及安全策略会进一步使得配置及开发gdd工具变得更复杂。
Additional factors like network topologies and security policies can further complicate the configuration and deployment of GDD tools.
如果没有统一的策略,开发人员就要为每个网络应用程序重复实现定制的安全机制。
Without a unified strategy, developers re-implement custom security for each network application.
如果没有统一的策略,开发人员就要为每个网络应用程序重复实现定制的安全机制。
Without a unified strategy, developers re-implement custom security for each network application.
应用推荐