• In this second act, the PaaS security policy focuses on protecting data in addition to managing access to applications.

    第二中,PaaS安全策略重点保护数据此外,还负责管理应用程序的访问

    youdao

  • Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.

    接下来使用者希望了解SaaSPaaSIaaS用户资源数据请求安全策略安全关注重点是什么

    youdao

  • The purpose of the solution is to provide a customizable financial market data hub based on PaaS.

    解决方案目的就是提供一个基于PaaS的自定义金融市场数据集线器

    youdao

  • Act II: Protecting data with paas.

    第二幕:使用PaaS保护数据

    youdao

  • Data protection includes risk mitigation of the PaaS as command and control centers to direct operations of a botnet for use in installing malware applications.

    数据保护包括降低僵尸网络(botnet)使用PaaS作为命令控制中心直接安装恶意应用程序风险

    youdao

  • Many PaaS are too Data-Centric and do not offer the ability to model and execute processes.

    许多PaaS过于数据为中心没有提供建模执行过程能力

    youdao

  • Business logic is often scripted within actions, following an MVC pattern. Data-centric PaaS could make it difficult to build systems that coordinate the activities between business partners.

    业务逻辑常常照本宣科的遵循MVC模式而以数据为中心PaaS构建系统与众不同,能够协调业务和参与者之间活动

    youdao

  • Business logic is often scripted within actions, following an MVC pattern. Data-centric PaaS could make it difficult to build systems that coordinate the activities between business partners.

    业务逻辑常常照本宣科的遵循MVC模式而以数据为中心PaaS构建系统与众不同,能够协调业务和参与者之间活动

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定