Access to further information was a challenge because of limitations of mobile devices, lack of acceptable technology in hotel rooms, language barriers and no clear business model.
移动设备的有限性、酒店客房缺乏客人可以接受的技术、语言障碍以及不清晰的业务模式,使获取更多的信息变得困难。
The goal of this laptop is to bring technology and access to information to children who would otherwise not have this ability.
这种膝上型电脑的目标是为那些条件不足的孩子带去技术和访问信息的途径。
This information helps us learn about the geographical distribution of our website visitors and the technology they use to access our site.
这些信息帮助我们了解网站访客的地域分布以及他们登陆我们网站时所采用的技术。
In providing this information, FAO has focused on the web, as this new information technology has made it increasingly possible for people worldwide to access the information provided.
在提供这方面的资料方面,FAO把重点放在网络上,因为网络这一新的信息技术已经使越来越多的人有可能在全球范围内获取需要的信息。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
Often, money and technology are not the issue, he said, so much as access to basic information about risks and simple ways to bolster buildings.
通常,钱和技术不是问题,他说,关于风险的基本信息和支撑建筑的简单方法的信息的获得同样不是问题。
We need to balance our own cultural value and globalization. The use of technology could help promote multilingualism and ensure equal access to resources and information.
需平衡自身文化价值与全球化。科技可帮助促进多语现象,保证不同语言有平等的获得资源与信息的权利。
Consider the technology already at Google's disposal. Start with the world's best search engine with access to the largest body of searchable information and media.
考虑到技术已经在谷歌的处置。开始与世界上最好的搜索引擎获得最大的机构搜索信息和媒体。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
As the "last kilometer" of information highway, access net is the bottleneck of the current networks. So the technology of broadband access turns into the hotspot of the research.
作为信息公路“最后一公里”的接入网部分已经成为当前网络瓶颈之所在,各种宽带接入技术也成为了目前研究的热点。
The annual ISI report describes the ability of nations to access and effectively take advantage of information and information technology.
ISI的年度报告描述各个国家取得和有效利用信息及信息技术的能力。
This paper discusses the two Web-page models' models, principles, Web-pages making, transmission methods of information (data) as well as the connection and access technology of database.
对这两种模型页面的模型及其原理、页面制作、信息(数据)传送方式、数据库的连接与访问技术等四个方面进行了对照研究。
The ATM synthesize the advantage of circuit mode and package mode and base technology foundation for synthetic access of various multimedia service and high transport of information.
ATM技术综合了电路模式和分组模式的优点,为各种业务的综合接入和信息的高速传输提供了技术基础。
On the other hand, utilizing the smart antenna and the users' spatial information, we can develop the Space Division Multiple Access (SDMA) technology.
另一方面,利用智能天线和用户空间位置信息可以实现空分多址(SDMA)接入技术。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.
存取控制技术的研究是信息安全领域一项重要的研究课题,它的研究对于保证信息的完整性和认证性有着重要的意义。
Concerning e-reading, digital technology gives us access to information, to content, if you will, on a scale never before possible.
提及电子阅读,数字技术以前所未有的规模让我们随心所欲地获取信息和内容。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
The thesis researches on the identity authentication and access control in information security technology.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
In this thesis, the technology about Access broker is studied and the Weapon Information Storage System is designed and implemented.
本文主要研究分布式虚拟环境中与访问代理相关的技术问题,以及武器装备信息存储系统的设计方法与实现技术。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
应用推荐