In fact, it's fair to say that the more we see network connectivity rolled out into various places, the more it seems good connectivity is hard to find.
事实上,公平地说,虽然我们在各种场合见到的网络连接多了,可是优质的的连接更难找了。
You should now see a dialogue box listing all of the print queues on your network.
你现在会看到一个对话框,上面列出了你的网络上所有的打印任务。
If you look at the top of your phone, you will usually see a little symbols that says 3G or 4G. The G means "generation" of your mobile network.
你看一下手机的顶部,你通常会看到一些小符号,上面写着 3G 或 4G。G 的意思是移动网络的“一代”。
At the bottom of the figure, you can see an architecture that includes two network interfaces per host.
在该图的下面部分中,您可以看到这样一个架构:每台主机上都包含两个网络接口。
If your organization is spread out geographically across several sites, then you will see more variation in network latency between computers in your sites and your VPN endpoint.
如果您的组织跨几个地点分布,那么您将看到您各个点上的计算机和您的vpn端点之间的网络延迟有更多变化。
All one can see is a stream of packets over the network.
人们所能看到的只是通过网络传输的一系列数据包。
As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data.
正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。
If all is well with your network configuration, you will see the trap arrive at the remote machine.
如果您的网络配置一切正常,您将看到陷阱到达远程机器。
If we reused the key, the eavesdropper would likely see a different value placed on the network due to the random padding.
通过这样一填充,即使我们重用密钥,偷听者在网络上两次看到的数也是不一样的。
As more corporate functions, such as human resources or sales, are managed over a network, companies can see patterns across the whole of the business and share their information more easily.
随着更多的公司职能部门基于网络管理,比如人力资源或销售,公司可以看到整个业务的模式,从而更方便地分享信息。
You can see this sort of network in Figure 1 below.
可以在下面的图1中看到此类网络。
The original clients see the same network traffic as if they were communicating to the remote server directly.
原来的客户所看到的网络消息就像和远程服务器直接通信一样。
You'll need to further configure your environment the first time you do this, which requires inputting your terminal type plus hostname and network information (see Listing 6).
在第一次进行这项操作时,您需要对环境进行进一步的配置,这需要输入您的终端类型、加上主机名和网络信息(请参见清单6)。
In addition to the CPU savings mentioned before, we see roughly equal network bandwidth consumption, and a slight increase in total disk activity.
除了前面提到的CPU资源方面的节省,我们可以看到消耗了几乎相同的网络带宽和稍显频繁的总的磁盘活动。
In addition to the CPU savings mentioned before, we see less network bandwidth consumption and a higher total disk activity.
除了前面提到的CPU资源方面的节省,我们可以看到消耗了更少的网络带宽和更频繁的总的磁盘活动。
This is used so the VIO Server can access the network (see Figure 4).
这样一来,VIO服务器就可以访问网络了(请参见图4)。
It USES the physical network adapter using the SEA just created to access the public network (see Listing 3).
它使用刚才创建的SEA,通过物理网络适配器来访问公共网络(请参见清单3)。
As you can see, my home network sits on the absolute worst part of the spectrum possible.
正如你所见,我家的网络正连在最差的信道上。
It's conceivable to see how such a network on the ground could be connected to airborne nodes that communicate with an extended cloud network.
可以想象,地面的网络可以通过延伸的云计算网络与空中节点相连接。
In this case, you can see that the Network file System (NFS) protocol is in the first file but not the second, while both the mysql and VNC ports have been open during the latter scan.
在这个示例中,您可以看到,在第一个文件中出现了网络文件系统(NFS)协议,在第二个文件中则没有出现,而在后面一次扫描期间,mysql和vnc端口都处于打开状态。
After heartbeat starts successfully, you should see a new network interface with the IP address that you configured in the ha.cf file.
heartbeat成功启动后,您应该看到一个新的网络接口,其IP地址是您在ha. cf文件中配置的那个IP地址。
You can see people in your network who are initiating new startups by doing an advanced search for a range of keywords such as “stealth” or “new startup.”
使用一系列的关键词进行高级搜索,你可以看到你的人际网络中都有谁开始创业了,这些关键词包括“stealth”“newstartup”等。
You can see the configured printer in the Windows network neighborhood in the same subnet.
在同一子网中,可以在Windows网络邻居中看到配置的打印机。
You can see the Samba server in the network neighborhood of the client.
在客户机的网络邻居中可以看到Samba服务器。
You can see a new bridge network interface has been created and the eth0 configuration is cleared.
您将看到创建了一个新的桥接网络界面,并且清除了eth0配置。
netstat -m is used to detect shortages of failures of network memory requests (see Listing 10).
netstat -m用于检测失败的网络内存请求(请参见清单 10)。
Netstat -m is used to detect shortages of failures of network memory requests (see Listing 12).
netstat - m用于检测失败的网络内存请求(请参见清单12)。
Configure the IPL parameters for the Network Server Description (see figure 6).
为网络服务器描述配置IPL参数(参见图6)。
We have a very dense network inside Google, you see all kinds of stuff. It's become a secondary communication channel.
Google内部有一套很复杂的网络,我们能看到所有东西,这成了我们第二套沟通渠道。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
应用推荐