In this address, I am asking you, the Harvard graduates, to join us.
在本次演讲中,我请求在座各位哈佛毕业生加入我们。
It takes quite some time for a Chinese English learner to understand the western concept of privacy being violated in this address.
学英语的中国人得费点儿时间才能理解这一问候语侵犯了西方人的隐私。
Windows doesn't usually let you access all of the memory in this address space; your process gets just under half for its own private use, and Windows USES the rest.
Windows通常不会允许您访问地址空间中的所有这些内存,进程自己使用的只有不到一半,其他供Windows使用。
To address this, a variation on the original escapement was invented in 1670, in England.
为了解决这个问题,1670年在英国发明了一种对原来擒纵装置的变体。
Some people believe the best way to address this issue is to have more people in the community volunteer to help them find jobs and secure housing.
一些人认为解决这个问题的最好方法是让更多的社区志愿者帮助他们找到工作和安全的住房。
To address this lack of knowledge in the test team, tools such as penetration testing and fuzzing are becoming popular.
为了解决测试团队这方面知识的缺乏,贯穿测试和模糊测试这样的工具逐渐流行起来。
This is how we address that purpose of education, to give students an opportunity to apply in practice what they have learnt.
这就是我们如何实现教育的目的,让学生有机会将所学应用于实践。
To address this in development before a translation is available, you can modify the text of your properties files to double their lengths.
要在翻译可用之前在开发中解决这个问题,您可以修改特性文件的文本以使其长度加倍。
In particular, a service registry or a workload manager could determine the most appropriate endpoint address in which to allocate this resource.
特别是,服务注册中心或工作负载管理器可以确定最适合的端点地址来分配这个资源。
The next section examines how to address this problem in one particular environment — the application server.
下一部分将讨论如何在一个特定的环境——应用服务器——中处理此问题。
In this section, we address two troubleshooting topics that occur frequently in user groups and conferences.
本节将解决在用户组和讨论会中频繁出现的两个故障检修主题。
The next article in this series will address issues of abstraction and leveling that are important to the development of a controlled vocabulary.
本系列中的下一篇文章将讨论对于控制词汇的开发非常重要的抽象和矫正问题。
We'll identify some of these in an address-space map later on in this article.
后面介绍地址空间映射时,我们将描述这些不同的部分。
In the intervening years this middle-class address has become an exclusive neighbourhood for Mumbai’s rich and famous.
这些年,这个原本是中产阶级居住的地方一跃而为孟买唯一的财富和名利区。
In this example, the address information is used as input to a Yahoo map program to display a map as part of the UI.
在本例中,地址信息被用做Yahoomap程序的输入以便作为UI的一部分来显示一个地图。
In this example, the IP address that was assigned to this Hadoop Master node instance is 170.224.193.137.
在这个示例中,指定给这个HadoopMaster节点实例的IP地址是170.224.193.137。
Open your favorite Web browser and paste in this URL in the address bar.
打开您最喜欢的Web浏览器,并将这个URL粘贴到地址栏。
This sets the first node, private1, and specifies an IP address (in this case on a local network).
这设置第一个节点private1,并指定一个IP地址(本例中位于一个本地网络上)。
In this example, one address will always receive e-mails of the build status, and another E-mail address will only receive e-mails of failures.
在此例中,一个地址始终接收构建状态电子邮件,另一个电子邮件地址将仅接收有关失败情况的电子邮件。
In this series of articles, we address this question by examining the various perspectives of those involved with the project.
在这一系列文章中,我们通过讨论关联于项目的不同视角对这个问题进行探讨。
This is Dwight Eisenhower in the farewell address, and he speaks the truth.
这是德怀特·艾森豪威尔在卸任演说中讲的,他说出了真相。
Consistent with this reality of industry-level standards consortiums, the industry in general needs to formally address this situation through standards.
与行业级标准协会的实际情况一致,一般行业都需要通过标准来正式地处理这种情况。
The XML signature process is meant to address this in a sweeping way, but that sweep is part of the problem.
XML签名过程打算以清扫方式处理这一问题,但这种清扫是问题的一部分。
In this scenario, solutions that address specific needs for the individual look inadequate, with the extended team being the target audience.
在这个场景中,处理私人特定需求的方案看起来不够,扩展的团队成为目标观众。
In this scenario a query gets the name and e-email address from a user, as in the following example.
如下例所示,在此情况下,查询语句获得用户的名称和电子邮件地址。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
应用推荐