The startup's product enables older adults who may not be comfortable with computers to access email, video chat and social media using just their televisions and a remote control.
这家初创公司的产品可以让可能不习惯使用电脑的老年人只用电视机和遥控器就能收发电子邮件、视频聊天和使用社交媒体。
For some organizations, access control to projects may not be a significant issue.
对于一些组织,对项目访问控制也许不是一个重要问题。
As you can see, the mechanism provided here can implement a very fine-grained type of access control.
正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。
The driving motivation behind this extension is to allow us to separate access control into a generalized framework that USES policies based on ownership and special relationships.
推动这种扩展的动力是允许我们将访问控制分离到一个通用的框架,该框架使用基于所有权和特定关系的策略。
As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.
作为一项最佳实践,在您想隐藏表中的部分列或行的时候,应该使用视图来控制对表的访问。
Create a portable and standard way of describing access control entities and their attributes.
创建一种可移植的、标准的方式来描述访问控制实体及其属性。
Each of these application roles aggregates a set of very specific portal access control roles.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
Apart from the rendering, it behaves like a default portal page, such as for access control.
除了传递,它的表现就像一个默认的门户页面,例如访问控制。
Singletons are a useful way to control access to a class, making sure that only one instance can exist.
单例模式是一种有用的控制类访问的途径,他能保证只有一个类实例存在。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
As a best practice, consider using stored procedures as a way to control access to your data.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
This requires RACF to use several different profiles in various classes to control access to a resource.
这要求RACF在不同的类中使用几个不同的概要文件来控制对资源的访问。
What happens when the everyday user tries to access a control that is authorized only for administrators?
当用户每天都试着访问仅授权给管理员的控制权时,会发生什么?
For example, POP3's single mailbox model can lead to thousands of large messages in a single location, making access and control of the mailbox a tedious affair.
例如,POP3的单一邮箱模型会导致数千条大型消息都处于一个位置,从而使得对邮箱的访问和控制成了件麻烦事。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy.
对主题访问的控制将通常由发布引擎基于主题层次结构中的访问控制列表进行管理。
An online policy is used for encrypting data written to a file system and protecting data with access control.
在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
While this is not the place for a thorough discussion on access control, you will need some idea about how users and groups are applied to files.
虽然在这里我们不能详尽地论述访问控制,不过您应该对用户和组对文件的访问权限有初步的了解。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.
它还确保脚本可以安全执行,并提供一个沙箱来控制DOM的访问和修改。
Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.
访问控制:细粒度的访问控制可能是必须的,通过一个数据库查找原语或对特定于应用程序的授权服务的调用实现。
Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
For example, you need to control access to EJBs using a network-safe encrypted token.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
A myriad of tools are required to provide the proper IT governance and access control at a macro level.
提供适当的IT治理和全面的访问控制需要使用许多工具。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
应用推荐