The machine uses a technology that automatically adjusts the speed and tone of any song being played to match the tempo and key the singer is using.
这台机器使用了一种技术,可以自动调整任何正在播放的歌曲的速度和音调,以配合歌手所使用的节奏和音调。
The service implementation queries the provider using the key and gets the corresponding data object associated with that key.
服务实现查询使用密钥查询提供者,并获得与该密钥关联的对应数据对象。
Using container-managed transactions (CMTs) provides two key advantages that are nearly impossible to obtain without container support: composable units of work, and robust transactional behavior.
使用容器管理的事务(CMT)提供了两个关键的优势(如果没有容器支持这几乎是不可能的):可组合的工作单元和健壮的事务行为。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
Understanding the answer to that question is the key to building meaningful security using SSL.
理解该问题答案的关键是使用SSL构建有意义安全性的关键。
You need to make sure people are using it and that the key stores are secure.
您需要确保人们准备使用它,并且关键的存储是安全的。
That data can only be decrypted using the private key.
这些数据只能使用私钥进行解密。
Being passionate about something is the key to success. But using that passion to help others is the key to happiness.
热情是成功的关键,而用这种热情去帮助他人则是幸福的关键。
Ciphers are cryptographic algorithms that can reversibly transform data using a key.
加密是使用密钥对数据进行可逆转换的加密算法。
It does this by examining the contents of the input data, using a specified field as a kind of key that uniquely identifies the corresponding process instance.
为此,它将使用指定的字段作为唯一标识对应流程实例的键来对输入数据的内容进行检查。
The key is that the attack is executed using well-defined APIs and protocols.
关键的问题是入侵者是使用定义良好的API和协议来进行攻击的。
For example, you can add information to a message using a key that is contained in a message; the key could be an account number.
例如,您可以使用消息中包含的密钥向消息添加信息;该密钥可以是一个帐号。
The key difference here is that WSIF is designed around using WSDL as a "normalized description" of a piece of software using a protocol.
这里的关键的不同之处在于,WSIF设计成以WSDL作为使用协议的软件的“规范化描述”。
Using the spare key that he carried, he unlocked the front door and entered the house.
他用备用的钥匙打开前门进了屋。
The service implementation queries the provider using the key and gets the corresponding value object associated with that key.
服务实现查询使用密钥的提供程序,并获得与该密钥关联的对应值对象。
To run a simple Web search, create a SearchClient object instance using the API key that you received from Yahoo when you registered.
执行简单的Web搜索需要使用注册时从Yahoo得到的API密钥创建一个SearchClient对象实例。
Scenario 4 displays information for the component that is causing a hang by using a magic key sequence available on Linux.
在第4种情况中,我们使用Linux上提供的魔术键控顺序(magic key sequence)来显示引发挂起问题的组件的信息。
You, as a manager, are in a key position to reduce that volatility using the condensed employee life cycle of HIAR (pronounced hire) - Hire, Inspire, Admire, Retire.
而经理这个职位,正是利用“雇佣,激励,赏识,退休”这样的员工职业周期来降低这种高变动性的关键职位。
Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.
使用强大的算法密钥将所有数据都进行单向加密意味着您的数据非常安全,但是使用时很不方便。
There is no provision for non-repudiation as all application data that is exchanged has been encrypted using symmetric key technology.
由于所有应用程序数据通过对称密钥技术进行加密后才进行交换,因此没有提供不可否认特性。
The key is to ensure that future coal plants are using CCS.
关键是确保今后的燃煤发电厂使用碳捕获和封存技术。
We could see that millions of people were using the same key file. And we put this key file on a blacklist, so when your key file is on a blacklist you can't get updates any more.
当我们看到数以百万计的人在使用同一 个密钥文件,我们就会把这个密钥文件放到黑名单里去,然后你将再也得不到任何更新。
This ensures that anyone can encrypt the message using the receiver's public key but only the receiver (the one with the corresponding private key) can decrypt it.
这就保证了任何人都能使用接收方的公钥加密消息,但只有接收方(拥有对应的私钥的一方)能够解密。
The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.
传递的数据使用公钥(非对称)加密算法加密,所以只有对应私钥的持有者才能解密数据。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
Thus, if one encrypts a message using the public key of an entity, then it is guaranteed that only the entity can decrypt the message.
这样,如果使用实体的公钥加密消息,那么可以保证只有该实体能够解密此消息。
The login module can also support default principals, that is, using default TGT or secret key when no principal name is specified.
登录模块还支持缺省主体,即,在没有指明主体名时使用缺省的TGT或密钥。
The receiver then decrypts the message digest using the sender's public key, confirming that the message was indeed sent by the sender.
然后,接收方使用发送方的公钥对消息解密,确认消息确实是由发送方发送的。
应用推荐