Your computer must use the same protocols as other network computers you want to communicate with.
计算机必须与进行通讯的其他网络计算机使用相同的协议。
Your computer must use the same protocols as other network computers you want to communicate with.
要提高计算机速度,仅单击使用该协议的组件。
The information processing mechanism for Neural Network Computers (NNCs) being explained, two functional models of NNC systems are presented.
在阐明神经网络计算机(NNC)信息处理机理的基础上,给出nnc系统的两个功能模型。
Click the protocols that this adapter will use. Your computer must use the same protocols as other network computers you want to communicate with.
请单击该适配器要使用的协议。计算机必须与进行通讯的其他网络计算机使用相同的协议。
Personal computers, network servers, network computers, and technical workstations are terms used to highlight major USES of particular types of computers.
个人电脑,网络服务器,网络计算机,以及技术工作站使用的词语,以突出主要用途的特定类型的计算机。
But it is not expected to take off in user sites until network computers, which require smart-card authorization prior to log in, are more widely deployed.
但是在登录前需要智能卡认证的网络计算机大规模装备之前,不要指望智能卡能有广泛应用。
People have been saying it for years, but this could finally allow much cheaper web terminals, or "network computers", to displace PCs, at least in some situations.
人们已就此讨论多年,然而这终于允许更便宜的网络终端,或“网络计算机”来取代个人计算机,至少在某些情况下。
But new neural-network computers, which more closely resemble the human brain, look particularly promising for teaching robots how to adapt to their surroundings.
但是,更近似人脑的新型神经网络电脑看来特别有希望能教会机器人如何适应环境。
In accordance with the laws of the official document, characteristics of network computers, as well as documents written by the actual demand, put forward the optimization ideas.
并根据公文写作的规律、网络计算机的特性以及公文写作者的实际需求,针对弊端分别提出相应的优化设想。
This paper introduces the evolution of network computing architecture and the conception of network computers (nc). Moreover, it presents the hardware and software configurations of network computers.
本文讨论了网络计算体系结构的演变、网络计算机(NC)的产生、NC的软硬件配置以及NC的特点等。
ISDN connectivity allows computers to communicate over a network.
综合业务数字网连接实现了计算机网络通讯。
You can create an access list of IP addresses that tells the router which computers on the network require NAT.
你可以创建一个IP地址的访问列表,告诉路由器网路中哪些计算机需要NAT 。
If your organization is spread out geographically across several sites, then you will see more variation in network latency between computers in your sites and your VPN endpoint.
如果您的组织跨几个地点分布,那么您将看到您各个点上的计算机和您的vpn端点之间的网络延迟有更多变化。
Individuals kept their data on their computers, using the network only for accessing external data, browsing the Web, or email.
个人把数据保留在自己的计算机,只是在访问外部数据、浏览网站或收发邮件时才使用网络。
If all you want is scalability, just add more computers, network bandwidth, and so on, to a single data center.
如果您所需要的是可伸缩性,则只需向单个数据中心增加更多的计算机和网络带宽等即可。
Through the network of message processors, therefore, all the large computers can communicate with one another.
通过信息处理器网络,所有的大型计算机得以互相沟通。
He then applied some of the principles from that network, which linked computers at the University of Hawaii, to his work at PARC.
随后,他将一些原理应用于由夏威夷大学计算机与他工作的施乐帕克研究中心计算机相连的网络。
A device the size of tablet might carry the processing power and memory of a network of computers.
药片大小的设备将拥有和一组网络计算机一样强劲的计算和存储功能。
For example, consider a typical home network with four computers connected to a wireless access point (WAP) or router with an outbound connection through a cable or DSL modem.
例如,考虑一个典型的家庭网络,其中有四台计算机连接到无线访问点(WAP),或者通过电缆或dsl调制解调器向外连接的路由器。
The network connecting these computers has its own challenges.
连接这些计算机的网络电脑有自己的挑战。
The weak link: County employees had been logging into the network through their home computers, leaving a gaping security hole.
薄弱环节是:郡上的员工曾通过家里的电脑登录过该网络,由此留下了一个安全缺口。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.
使用这种模式,可以在一个已知的网络攻击或者病毒程序沿着网络传播期间,暂时地锁定电脑。
Communication between applications, and even between computers on a network, is usually accomplished using messaging-a series of discrete packets of information.
应用程序间的通信(甚至网络上计算机之间的通信)通常都使用消息(即一系列不同的信息数据包)完成。
You can use this to build a virtual network between computers that are limited internally to connect to the outside world through an HTTP proxy, through to devices outside the public network.
对于受内部限制,不能通过HTTP代理连接到外部世界和公共网络上的设备的计算机,可以使用这种技术来在那些计算机之间构建一个虚拟网络。
Today's smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago.
今天的智能手机有着几年前桌上电脑所拥有的速度、存储和网络连通性。
As more computers joined the network, however, the Internet mutated into something far different and much more interesting.
然而,当越来越多的计算机加入网络后,因特网变异成了一种完全不同但又有意思得多的东西。
Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.
利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。
Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
克拉克和他的同事正在研究云服务是如何用于构建僵尸网络的。僵尸网络是由网络攻击者控制的受感染计算机网络。
Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
克拉克和他的同事正在研究云服务是如何用于构建僵尸网络的。僵尸网络是由网络攻击者控制的受感染计算机网络。
应用推荐