• Formulate and improve relevant information security and technology policy, industrial policy.

    制定完善相关信息安全技术政策产业政策。

    youdao

  • Regardless of the risks and security implications, the technology will advance, however.

    如果忽略掉这些风险安全问题技术还是在进步的。

    youdao

  • Therefore, license plate recognition technology has the particularly important practical application value in the public security and the traffic control.

    因此,汽车牌照识别技术公共安全交通管理具有特别重要实际应用意义

    youdao

  • These packs work together to simplify the business, technology, security, governance and process interoperability issues associated with business services in an SOA.

    这些包协同工作简化SOA中的业务服务相关联业务、技术安全治理流程互操作性问题

    youdao

  • But security experts say it contains biological and chemical sensor technology, video, wireless communications, and computer software to simulate the spread of potential contaminants.

    安全专家包括了生物化学传感器技术视频无线通信以及模拟潜在污染物蔓延计算机软件

    youdao

  • What other technology allows you do declare your transaction model, security model, persistence model, and so on in XML, and runs those models for you at runtime?

    其他哪些技术使能够声明事务模型安全模型、持久性模型XML中的模型并且运行时运行那些模型

    youdao

  • He added that it could also have implications for manufacturers of optical-data storage devices for security applications, optical sensing devices and display technology.

    补充可能运用安全方面、光学传感装置显示技术上的光学数据存储设备生产

    youdao

  • Ad technology companies and Internet companies say they, too, are making efforts to boost the security of their systems.

    广告技术公司网络公司表示他们努力提高自己系统安全性

    youdao

  • The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.

    协议涵盖企业安全呼吁支持信息技术服务,对新出现网络威胁网络入侵提高认识

    youdao

  • This part's chapters contain a massive amount of information, reflecting the many aspects of digital security, and discussing the history as well as popular misconceptions for each technology.

    部分章节包含大量信息反映数字安全许多方面并且对于一个技术都讨论了其历史普遍误解

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S.Department of Homeland Security (DHS) and R.Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录

    youdao

  • The MOU was signed in New Delhi by Jane Holl Lute, Deputy Secretary for the U.S. Department of Homeland Security (DHS) and R. Chandrashekhar, Secretary, India Department of Information Technology.

    美国国土安全部(DHS)部长霍尔·卢特和印度信息技术部部长坎德·拉赫·哈尔新德里签署这份谅解备忘录。

    youdao

  • Active involvement in selecting technology standards, evaluating and selecting tools, macro and micro design, development, testing, implementation, reuse, and security aspects.

    积极参与选择技术标准评估挑选工具宏观微观设计开发测试实现重用以及安全方面等等

    youdao

  • The technology available today is mainly designed for security professionals, and does not always meet the needs and use cases of development.

    当今可利用技术主要安全专家所使用,通常没有满足开发需求

    youdao

  • The National Institute of Standards and Technology (NIST) has revised its testing requirements for security products that use the security Content Automation Protocol (SCAP).

    美国国家标准技术研究院(NIST)修订了使用安全内容自动化协议(SCAP)的安全产品测试要求

    youdao

  • Otellini gave a very brief preview of a forthcoming hybrid software-silicon security technology to come from Intel and its McAfee subsidiary.

    欧德宁给了非常简短预览,关于一款即将推出的来自英特尔它的子公司迈克菲的混合软件安全技术

    youdao

  • SOA security must be factored into the SOA life cycle, reflecting the fact that security is a business requirement and not just a technology attribute.

    必须SOA生命周期中考虑soa安全性并反映安全性业务需求只是技术特性事实

    youdao

  • What you don't see in Figure 3 is object pooling, automatic transaction processing, security, and all the other good things that EJB technology provides.

    3没有看到对象自动事务处理安全性以及EJB技术提供所有其他东西

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S.Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务主要客户是美国情报和军事部门。

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U.S. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • ACI provides information technology and network security solutions, and systems engineering and development services, for the U. s. Intelligence and military communities.

    ACI公司提供信息技术网络安全解决方案以及系统工程学开发服务,其主要客户是美国情报军事部门

    youdao

  • Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.

    企业政策制定者必须克服这些关于隐私安全数据访问技术部署问题的不对称诱因

    youdao

  • Network services requiring security and availability should benefit from this powerful operating system technology.

    需要确保安全性可用性网络服务应该受益这种强大的操作系统技术

    youdao

  • Used to seek military superiority or to wage wars, advanced space technology will seriously endanger the peace and security in outer space and jeopardize the happiness and welfare of mankind.

    先进空间技术如果被用于谋取军事优势进行战争,严重危及外空和平安全和全人类福祉

    youdao

  • Switzerland has a developed economy, advanced technology and abundant capitals, and excels in the fields of financing, insurance, social security and environmental protection.

    瑞士经济发达技术先进资金雄厚金融保险社会保障环保领域具有优势。

    youdao

  • Indeed, hackers are everywhere, according to Bruce Schneier, security expert and chief security technology officer for it service-provider BT.

    正如IT服务提供商BT公司的首席安全技术、网络安全专家布鲁斯·施奈德指出的那样,黑客的确无处不在

    youdao

  • First, it has hired new advisers and lobbyists to convince Congress that worries about the security of U.S. technology are baseless.

    首先新的顾问说客国会信服美国安全担忧没有根据。

    youdao

  • Based on further analysis and security and non-functional requirements (see security issues affecting the ESB), select an appropriate implementation technology.

    基于更多分析以及安全和非功能性需求(请参阅影响ESB安全问题),最后选择一种合适的实现技术

    youdao

  • Based on further analysis and security and non-functional requirements (see security issues affecting the ESB), select an appropriate implementation technology.

    基于更多分析以及安全和非功能性需求(请参阅影响ESB安全问题),最后选择一种合适的实现技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定