• We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.

    我们研究WebSphereII过程模型描述受信任包装设防包装器之间不同后者研究分区数据库资源先决条件。

    youdao

  • Instead, members have to give trusted friends or family the information needed to log in to the site and start the notification process if something should happen.

    但是会员需要填写他信任朋友家人信息才能登陆如果出了什么事,就会启动通知程序

    youdao

  • Below is an overview of why the review process shouldn't always be trusted by investors.

    下文概述投资者为何不能完全信任所谓评级流程问题。

    youdao

  • Tip: If you are using DBACCESS for deployment to Informix and you machine is not a trusted client, MTK will prompt you for a password during the deployment process.

    提示如果使用DBACCESS来实现Informix部署并且所使用的机器不是信任的客户机,那么部署过程中MT k提示输入密码

    youdao

  • In the process Kurt had graduated from business adviser to trusted friend.

    这个过程中,科特商业顾问慢慢变成了一个值得信赖的朋友。

    youdao

  • In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.

    可信计算平台维护过程中,需要保证保护数据完整性安全性可用性。

    youdao

  • What would happen if more of us dropped our guard and trusted the process of life?

    如果更多卸下防卫来相信生命过程将会怎么样呢?

    youdao

  • This process may be expedited if the relationship is built on some existing relationship or "guanxi" such as kinship, the introduction of a mutually trusted third party, etc.

    这种进程有可能加快,前提已经有一些既有的关系、“裙带”、或者共同信任第三介绍等。

    youdao

  • The process that fills this role is often not trusted or seen as worthy of attention, for when we do engage it, we may make mistakes in perception or in decision making.

    意见通常认为是可信不值得被关注我们当真了,倒是形成错觉或做出错误决定

    youdao

  • In the process, we would lose some peace of mind and self-respect. We would also demonstrate that we cannot lie trusted, since we advertise our dishonor by telling our family and friends.

    过程中我们失去心灵宁静自尊既然我们会给家人朋友张扬这一不光荣的事情,说明我们值得信赖

    youdao

  • A user could access to trusted services in trusted computing platform only if he was authorized. So authorization is a key process to achieve trusted for platform.

    用户获取可信功能必须通过平台授权认证,因此授权认证实现平台可信一个关键环节

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定