The machine uses a technology that automatically adjusts the speed and tone of any song being played to match the tempo and key the singer is using.
这台机器使用了一种技术,可以自动调整任何正在播放的歌曲的速度和音调,以配合歌手所使用的节奏和音调。
In this example, the license key is imported into the license server, which resides on the workbench machine and serves the key to all remote machines.
在这个例子中,许可密钥被导入到许可服务器之中,它位于工作台机器上,并且将密钥提供给所有的远程机器。
But with a large number of machines, walking around to each machine and creating each location key by hand is not ideal.
但是如果有很多机器的话,那么遍历每台机器并且手工创建每个位置键就不很理想了。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
One key step to achieving that level of service in a cloud application is by automating, and thereby enhancing, virtual machine connections.
在云应用程序中实现这种服务水平的关键一步是自动化和增强虚拟机连接。
Using only a camera, a computer and a key-cutting machine, scientists have duplicated sets of keys after taking snaps of them from more than 60 metres away.
只需要一台照相机、一台电脑和一台配钥匙机,科学家们通过在60米开外进行拍照就可以复制一串钥匙。
The key to the solution is the option of high availability configurations based on Power virtualization, which allows applications to automatically be moved off of a failing machine to a backup.
这种解决方案的关键是选择了基于电源虚拟化的高可用性配置,它允许应用程序自动从故障机转移到备份机。
Now that the scripts, configuration, and key information are in place, you need to copy the information to each machine.
现在脚本、配置和密匙信息已就绪,需要将这些信息复制到每台机器。
The world's longest tunnel will take shape deep beneath the Swiss Alps on Friday when a giant drilling machine clears a path for a key high speed railway through the heart of Europe.
在巨大的钻孔机清理出一条小道后,横贯瑞士阿尔卑斯山下方世界上最长的隧道终于成形。这条隧道将建设成为穿过欧洲心脏地带的高速铁路通道的关键路段。
Do not forget to save the private key generated; otherwise, you will be out of luck when you try to connect to the virtual machine with an SSH client.
不要忘记保存生成的私钥;否则,在尝试通过SSH客户端连接到虚拟机时就没那么走运了。
The key advantage here is that the same object code can be executed on any hardware platform that supports the abstract machine (the interpreter).
这里的主要优势在于,可以在支持抽象机器(interpreter)的任何硬件平台上执行同样的对象代码。
Metronome USES several key approaches within the J9 virtual machine to achieve deterministic pause times while guaranteeing GC's safety.
Metronome使用J 9虚拟机中的几个关键方法来实现确定的暂停时间,同时保证GC的安全性。
The key creation on the Vista machine was done in the Setup certificates on the Vista Web Service host section.
在 “在VistaWeb服务主机上设置证书” 一节中已经在 Vista机器上创建了密钥。
When all the previous configuration setting are complete, run the SSH to log onto the remote machine using the public key authentication.
完成上述所有配置设置之后,运行ssh使用公共密钥身份验证登录远程机器。
At the boot loader prompt, you can press the Tab key to see all of the available labels you can type to boot your machine.
在引导载入程序提示时,可按tab键查看可为引导机器而键入的全部可用标记。
The key to the process is ypbind, which attaches the client machine to the NIS server.
该过程的关键在于ypbind,该工具可将客户端计算机附加到NIS服务器。
The SSH key used to connect to the virtual machine can be generated using the Development and Test Cloud user interface or using the command line.
使用DevelopmentandTestCloud用户界面或命令行,可以生成用于连接到虚拟机的ssh密钥。
If the key is not generated for the Informix server principal or when the server key is stored in an incorrect location in the IDS server machine, the gss_acquire_cred fails.
如果没有为Informix服务器主体生成密匙,或服务器密匙存储在IDS服务器机器中的错误位置,就会导致gss_acquire_cred失败。
Upon pressing escape key (esc), to commit the changes, the machine id is automatically generated.
按esc键提交修改,就会自动生成机器id。
It is not a single machine anymore and this is the key difference.
它再也不是一台单独的机器,有着很大的不同之处。
Then the information can be plugged into a key-cutting machine to produce an exact replica.
然后把这些信息输入到配钥匙机,就可以配出一模一样的钥匙。
The public key must be stored on the target machine to complete the public-private key combination.
为了完成公共-私有密钥组合,必须把公共密钥存储在目标机器上。
You need to append the public key file contents to each machine you want to log in to automatically.
您需要将这个公钥文件的内容追加到您希望自动地进行登录的每台计算机。
The form that lets you create new instances requires you to specify a machine image, a key pair, and a security group.
允许您创建新实例的表单要求您指定一个机器映像、一个密匙对和一个安全组。
When using SSH to run commands across multiple machines without exchanging your public key, you need to type in your password for each machine.
如果不交换您的公钥,那么使用SSH在多台计算机中运行相应的命令时,您必须为每台计算机输入您的密码。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
One of the main benefits of SSH is that you can bypass the normal login and password exchange by copying your public key to a remote machine.
SSH的主要优点之一是,通过将您的公钥复制到一台远程计算机,您可以绕过正常的登录和密码交换。
Key event-timing accuracy can vary greatly between entry sessions and even individual keystrokes as network latencies and machine processing times are subject to a wide variety of influences.
输入会话之间甚至每次击键之间的键事件计时精确性可能极为不同,因为网络反应时间和计算机处理时间可能会受到各种各样的影响。
Quantum tunneling is also a key feature of the scanning tunneling microscope, the first machine to enable the imaging and manipulation of individual atoms.
量子隧穿还是扫描隧道电子显微镜的一大特色。这是第一种能够拍摄和操作原子的显微镜。
This article presented a set of pages to work with virtual machine images, running instances of those images, and the key pairs and security groups that allow you to manage them.
本文呈现一组页面以处理虚拟机映像,映像的运行实例,以及允许您管理实例的密匙对和安全组。
应用推荐