In 1973 sociologist Mark Granovetter showed how the loose acquaintances, or "weak ties", in our social network exert a disproportionate influence over our behaviour and choices.
1973年,社会学家马克·格兰诺维特指出,在我们的社交网络中,关系松散的熟人或“弱关系”对我们的行为和选择产生了不成比例的影响。
Others opted to lie, and they showed increased activity in their frontal parietal control network, which is involved in difficult or complex thinking.
其他人选择撒谎,而他们的额顶叶控制网络的活动增加了;这部分大脑与困难或复杂的思考有关。
Perhaps you're bringing your unique knowledge and gaining access to someone else's professional network, or maybe you're able to learn a new skill by working with someone.
也许你会把自己独有的知识带入别人的职业网络,或者可以通过和别人一起工作来学习一项新技能。
An e-mail to the network from Janet Anderson, director of the EPA's bio pesticides division, says "there is no record of a review and/or clearance to field test" the organism.
环保署生物杀虫剂部门主管珍妮特·安德森发给该网络的一封电子邮件表示,“没有对这种生物进行审查和/或野外测试的记录。”
With a fast network and a smartphone, anyone who has passed the identity (身份) check can be an online teacher, and anyone with an online account can buy "pay for knowledge" products that he or she wants at an affordable price.
通过高速网络和智能手机,任何人通过身份核验后都可以成为一名线上教师,并且任何拥有线上账户的人都可以以实惠的价格购买自己需要的“知识付费”产品。
These two examples include information like CPU and memory usage by process or task, in addition to network metrics.
这两个示例包含的信息有进程或任务的CPU和内存使用率,以及网络指标。
An IP address serves two principal functions: host or network interface identification and location addressing.
IP地址用于两个主要功能:主机或网络接口标识和位置寻址。
This technology is built right into the database and requires no additional hardware, software, or network infrastructure.
这项技术被内置到数据库中,并且不需要额外的硬件、软件或网络基础设施。
Privacy and integrity: When the messaging network or volume of message data is large, encrypting all traffic can be prohibitively expensive.
保密和完整性:当消息网络或消息数据量非常大时,对所有流量加密的代价高得惊人。
The first is that you may simply be debugging an existing network application or one you are developing, and want to monitor the traffic going past on your network.
其中第一个原因是您可能正在调试一个现有的网络应用,或者您正在开发一个应用,而您想要监控通过您的网络的流量。
These are dedicated units for storage in a network without keyboard or display and are controlled and configured over the network.
这些服务器是网络中专门用于存储的单元,没有键盘或显示器,通过网络控制和配置它们。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
Back up local files to the network server or work on the network and allow the IT department to handle things.
把本地文件备份到网络服务器,或者在网络上工作并允许IT部分处理事情。
That patch in turn can transmit data to a smartphone or wireless network and on to the patient's doctor.
反过来,这个贴片可以向智能手机或无线网络传送数据,把信息传递给患者的医生。
This is because some databases are configured to kill long idle connections and a network or database related exception may also kill a connection.
这是因为一些数据库被配置为会杀掉长时间空闲的连接,网络或数据库相关的异常也可能会杀死连接。
RSCT detects the loss of heartbeat packets that are sent across all the networks and determines the exact loss (network, NIC or node failure).
RSCT实际上探测跨所有网络发送的心跳数据包是否丢失并判断准确的丢失(网络、NIC或节点故障)。
The calls move much more data than the average HTTP GET or POST call, and network performance is bound to be impacted.
其调用移动的数据量要比一般的HTTPGET或POST调用要多,因此网络性能受到的影响必定很大。
Taking Bluetooth and having one phone connect to a phone on a different network or a different handset manufacturer and having Bluetooth connection is nearly impossible.
如果有蓝牙,让一部手机,和另一个网络的手机,或者另一个生产商的手机,利用蓝牙相连基本上是不可能。
According to the relevant State regulations, remove from the network and address, directory or server which has content in violation of article five.
按照国家有关规定,删除本网络中含有本办法第五条内容的地址、目录或者关闭服务器。
You're more likely to rely on the existing network and infrastructure and have little or no control over the networking decisions.
您可能更多地依赖于现有的网络和基础设施,对网络决策的控制很少甚至不能控制。
With so much data usage, phones of all varieties are frequently forced back to AT&T’s older and slower EDGE network, or are forced off the cellular network altogether.
由于过多的使用数据服务,各种品牌各种型号的手机在AT&T又老又慢的EDGE网络中常常被拒绝服务,或者完全关闭其蜂窝网络。
Life moves so quickly these days and though we may network or socialize with many people, we don't necessarily get to know them on a deeper level.
现今生活节奏如此之快,哪怕我们可以与很多人进行网交或者社交,我们却并没有必要更深地去了解他们。
We can process operations out of order and end up with the same result, so we can paper over temporary network and hardware failures, or even replay lost data from minutes or hours ago.
因为能交换操作顺序而不影响最终结果,所以我们才能在网络或者硬件临时故障的时候记录下所有操作或者恢复几分钟甚至几小时之前丢失的数据。
The ability to open and close sockets to remote hosts or servers is a network operation and does not require any large amount of processing on the image running the application.
打开或关闭远程主机或服务器的套接字是一个网络操作,不需要对运行此应用程序的图像进行大量处理工作。
Consider two failover scenarios: a controlled switchover and an uncontrolled switchover due to a power or network failure.
我们来看看两个故障转移场景:一个受控切换,一个由于电源或网络故障导致的失控切换。
Instead of trying to penetrate a network and find a domain or network they're completely unaware of, the hacker only has to infiltrate a portion of a network that they do know about.
他们不必再去尝试潜入网络并找到毫不了解的域或网络,只需进入自己了解的某个网络的一部分即可。
Network hacks, unauthorized equipment, and bad or misconfigured hosts can all lead to potential problems on your network.
网络攻击、未经授权的设备,以及错误的或者不正确配置的主机,都可能导致在您的网络中出现潜在的问题。
Graph or table representations for formal language grammars and network protocols.
形式语言语法和网络协议的图或表表示法。
Specifically, the focus is software and node configuration scenarios within the demilitarized zone (DMZ), or external network, and the implementation procedures for using these designs.
具体地说,主要关注非军事区(demilitarized zone,DMZ)或外部网络中的软件和节点配置场景,以及使用这些设计的实现过程。
Use a 100 Mbit or better network connection between the server and RDBMS.
在服务器和RDBMS间使用100Mbit或更好的网络连接。
应用推荐