现在,如果我们试图用一个无效的网络ID潜入新员工的计算机,我们的应用程序不会允许。
Now, if we try to sneak in a new employee's computer with an invalid network ID, our application knows not to accept it.
确保网络身份的安全是很重要的。
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
这个交互式菜单系统覆盖了系统管理的大多数领域,从修改每个用户ID的最大进程数量直到修改网络接口的速度。
This interactive menu system goes into most areas of systems administration, from changing the maximum number of processes per user ID to changing the speed of a network interface.
现在,如果我们试图偷偷在一个新员工中输入一个无效网络ID,应用应该会拒绝它。
Now, if we try to sneak in a new employee with an invalid network id, our application knows not to accept it.
网络ID使用大小写敏感,部分匹配一些值,或者
The network ID partially matches some value with case-sensitivity, or
就象我们为list模板所做的那样,改变代码以显示员工的网络ID。
Just like we did for the list template, change the code to display the employee's network id.
这个固件级别将更正emcClassb适配器的供应商设备ID,以便在AIX网络安装管理(NIM)过程中能够识别该适配器。
Gol021-this level of firmware corrects the vendor device ID on EMC Class B adapters so that the adapter is recognized during AIX Network Installation Management (NIM).
她申请的73项u.s.专利涵盖的范围从网络、Web、安全、保密、多媒体、无线、普遍设备到无线电频率ID。
Her 73 filed U.S. patents range from networking, Web, security, privacy, multimedia, wireless, pervasive devices, to radio frequency ID.
将它改为显示员工的网络ID。
替换EmployeeBean列的当前文本,改为显示员工的网络ID。
Instead of the current text in the employee Bean column, let's change it to display the employee's network ID.
在Applicationkey字段中,输入您刚才在erp后端网络的工作流应用程序中为应用程序id指定的值(在本例中为ZMATCR)。
In the application key field, enter the same value that you specified for application ID in the workflow application in the ERP back-end network (in this case, ZMATCR).
而现在,ID盗贼们有可能仅仅通过搜索网络和观察照片就获取到他们想知道的一切信息。
Now ID thieves could potentially find out everything they need to know just by surfing the web and looking at photos.
诺基亚针对苹果的各种索赔包括对触摸屏技术,显示照明,来电显示技术,3g和无线网络技术的侵权。
Nokia's various claims against Apple included alleged patent infringements of touch interfaces, caller ID, display illumination, and 3g and wi-fi technology.
由于ID卡卡内无内容,故其卡片持有者的权限、系统功能操作要完全依赖于计算机网络平台数据库的支持。
The ID Kaka in London, is the competence of its card holders, operating system functions to depend entirely on the computer network database platform support.
网络中每个域的域id必须惟一。
如果一切按计划进行,那么现在您应该能够连接到我们刚刚建立的无线网络(网络标识为“test”),能够运行DHCP客户机并从常规的DHCP服务器获取DHCP服务。
If everything went according to plan, you should now be able to attach to the wireless network we just made, network ID "test," run a DHCP client, and get DHCP service from your regular DHCP server.
我们的网络是自动寻(找地)址。
如,数据库要求网络ID长度不超过8个字符,但是,我们也会加强我们的业务规则,要求网络ID的长度必须不小于6位字符。
For example, the database requires that network IDs not exceed eight characters in length, but we'll also enforce our business rule that a network ID must be no fewer than six characters in length.
对于一个社会化网络图,这些顶点id即用户id,但是对于“收藏”推文这样的边,其目标顶点(destinationid)则是一条推文的id。
For a social graph, these node IDs will be user IDs, but in a graph storing "favorite" tweets, the destination may be a tweet ID.
同时,所有网络服务商应该建立一个电子邮件地址身份系统(有两个好的标准,域名密钥和存储保护特征)。
At the same time, all ISPs should implement an E-mail ID system (there are two good standards, called Domain Keys and SPF).
为克服现有入侵检测存在的不足,本文从特征提取、模糊神经网络应用于入侵检测、算法优化等方面进行了系统研究。
To ride of the shortage of the id, we study on the extraction of the features, id method based on fuzzy neural network, and algorithm optimization and so on.
然而,银行的工作人员发现在他们电脑网络系统(是和警察的电脑网络身份认证系统联网的)里我身份文件里的照片不是我本人。
However, the people at the bank found the PIC of me in their computer system and the police computer system isn't me, but it is with my ID number and my information.
目的为保证网络信息交互的安全,在数字语音通信中对说话人进行身份认证。
Aim to identify the id of the speaker in digital voice communication in order to assure the security of information which is transmited in the network.
当下,网络社会的信任危机日益严重。
At present times, the trust crisis of network society id getting increasingly severe.
您的位置信息是基于细胞身份证定位,即通过蜂窝网络识别你的设备的位置。
Your location information is based on cell ID positioning, that is, the cellular network recognises the location of your device.
基于此,笔者选择PBL作为网络课程的教学设计模式,着重对网络课程的核心问题“学习内容”与“学习活动”的设计开发进行了探讨。
So the paper chooses the PBL as the module of ID, moreover emphasizes the design of learning contents and learning activities in web based course.
基于此,笔者选择PBL作为网络课程的教学设计模式,着重对网络课程的核心问题“学习内容”与“学习活动”的设计开发进行了探讨。
So the paper chooses the PBL as the module of ID, moreover emphasizes the design of learning contents and learning activities in web based course.
应用推荐