Capturing the energy efficiency prize is critical both to climate and energy security - and it relies on a well-known set of policy signals and a proven set of technologies.
无论是对气候还是对能源安全来说,提高能源利用率都很重要——而这取决于一系列众所周知的政策导航,也取决于一系列可靠的技术。
Their insistence on deciding the Kosovo question in the United Nations Security Council amounts to giving Russia a veto over Kosovo, giving it in effect a say over EU policy.
这些国家坚持要联合国安理会对科索沃问题进行裁决,这等于逼着俄罗斯在科索沃问题上投否决票,最终这也让它在欧盟政策上有了发言权。
Regular system auditing will also help refine the security policy used for new machine installations as it helps close the feedback loop on what subsystems are actually in use.
正常的系统审计也可以帮助提炼安装新机器时所使用的安全策略,因为它有助于关闭关于实际使用的子系统的反馈循环。
It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.
可能出现下面的情况:一个安全性设置在几年前首次定义队列管理器时是合适的,但现在不再符合您站点的安全策略。
In the past, the United States has thrived when both our nation and our national security policy have adapted to shape change instead of being shaped by it.
过去,当我们的国家及安全政策主动适应变化(而不是被动改变)的时候,美利坚合众国总是能变得兴旺发达。
It would be unfortunate if the Kremlin, rather than overhauling its security agencies and reviewing its north Caucasus policy, opts to act in similar fashion now.
若克里姆林宫不整顿安全机构,也不重新审视其北高加索政策,反而选择故技重施,则不免令人遗憾。
Indeed, persistent problems in immigration policy consume valuable resources needed to advance other security objectives and make it harder to focus on the most dangerous threats facing our country.
事实上,移民政策上存在的老问题耗费了了本应该用于其他安全目的的宝贵资源,同时也使得我们很难集中精力应对最大的威胁。
This tier can be thought of as the link between business security services and IT security services and includes areas such as policy administration and distribution.
这一层可以看作业务安全服务与IT 安全服务之间的链接,它包括策略管理和分发等领域。
It lists the standard SCA policy elements and attributes for three domains: security, transaction and reliable messaging.
它列出了三个域的标准sca策略元素和属性:安全、事务和可靠消息传递。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
For example, to meet corporate security needs, an it organization is tasked with creating and implementing a password policy.
举例来说,要满足公司的安全需求,IT组织要创建并实现密码政策。
For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.
举例来说,根据服务对具体的隐私策略的支持或着服务提供的安全保证,可以从功能上等价的服务的列表中选出服务。
It can also be used to verify the effect of a new or changed security policy.
它还可以用来检验新的或修改的安全策略的效果。
It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.
它还存储了单元的整体信息,比如单元范围的安全策略、票证有效期等。
Since the client was configured to read the WS-Policy and use it to configure the client's WS-Security settings, the Web service invoke failed.
由于客户端被配置为读取WS-Policy并使用它配置客户端的WS-Security设置,因此Web服务调用会失败。
It also supports multiple Policy Decision Point (PDP) technologies including LDAP and TFIM to enforce ESB security for the SOAP, MQ and HTTP transport protocols.
它还支持多个策略决策点(PDP)技术(包括LDAP和TFIM),以便为SOAP、MQ和HTTP传输协议强制执行esb安全。
One from the Centre for Security Policy urges Americans to "Vote as if your life depends on it. Because it does."
安全政策中心所作的一则广告力劝美国人“投票时押上你的生命,因为它确实命运攸关。”
Be sure to set a security policy that permits access via SSH. (Although CouchDB USES HTTP, you'll communicate with it through an SSH tunnel for simplicity's sake.)
确保设置了允许通过SSH访问的安全策略。(虽然CouchDB使用HTTP,但考虑到简单性,您将通过一个SSH通道来与它通信)。
This rule is verbose to make it easier to explain, but also because it expresses the security policy in such a way that, once you're familiar with the syntax, it's easy to understand and change.
此规则非常详细,一方面是为了便于解释,另一方面是因为以这样的方式表示安全策略,一旦您熟悉了语法,要理解和更改它将是非常容易的。
Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.
当然,为了阻止入侵者猜密码或者强制攻击这些密码,最好确保该设置与你的其他安全策略一起使用。
But Obama found it more important to avoid an abrupt change in the global security policy given the two US wars in Iraq and Afghanistan and the ongoing terror threat.
但是奥巴马觉得避免针对在伊拉克和阿富汗这两场与美国有关的战争及当前的恐怖威胁的政策的突然转变更重要。
Specify the consequences of noncompliance with the security policy and it policy regulations.
指定不遵守安全策略和IT策略规定的后果。
Looking at an example, suppose a connection is made from a test server into production, one would certainly want to be informed about this event, even if the company security policy allows it.
看看此例,假设从测试服务器向生产服务器发出连接,此事肯定要通知相关人员,即使公司安全策略允许这种情况。
Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users.
某些系统的安全策略可能不允许向其他用户泄露密码。
It also has a second set of policy set and bindings for configuring message-level security to the Tivoli Federated Identity Manager trust service.
客户端还有第二组策略集和绑定,用于配置TivoliFederatedIdentityManager信任服务的消息级安全性。
From a security perspective, it is generally better to start with a Deny-All policy and grant exceptions than to start with an Allow-All policy and build a blacklist.
从安全角度讲,最好先使用一个Deny - All策略然后再授权例外,而不是先使用一个Allow - All策略然后再构建一个黑名单。
From a security perspective, it is generally better to start with a Deny-All policy and grant exceptions than to start with an Allow-All policy and build a blacklist.
从安全角度讲,最好先使用一个Deny - All策略然后再授权例外,而不是先使用一个Allow - All策略然后再构建一个黑名单。
应用推荐