For hot desert locations with access to seawater, a new greenhouse design generates freshwater and cool air.
对于能够接触到海水的炎热沙漠地区,一个新的温室设计可以产生淡水和冷空气。
Some find urban living, with access to electricity and running water, an improvement and would never return to the countryside.
有些人觉得城市生活有了电和自来水,改善了生活,就再也不会回到农村了。
Anyone with access to the Internet will be able to achieve the education needed to build a productive life in an increasingly high-tech world.
任何人只要能上网,就能获得必要的教育,然后在日益高科技的世界里过上丰富的生活。
In 2008, with ACCESS now in more schools, the number exceeded 22,000.
到2008年,随着“联网”项目普及到更多的学校,这一数字达到了22,000人。
Most companies have 10 to 100 users with access to a SharePoint site.
大部分的公司有10到100个用户需要访问一个SharePoint站点。
The global context looks like a map with access through key-value pairs.
全局上下文就像通过键值对进行访问的映射。
Authorization is handled in CM V8 with Access Control Lists (ACLs).
在CMV 8中,授权是通过访问控制列表(Access Control List,ACL)来处理的。
Informationis at the fingertips of anyone with access to a laptop or smart phone.
无论是笔记本电脑还是智能手机,信息皆留于指尖。
A secfsd process holds online policies, and encrypts and decrypts data with access control.
secfsd保存在线策略,以及与访问控制有关的加密和解密数据。
Venture capital provides startups with access to tens of billions of dollars every year.
风险资本每年为公司提供数百亿美元的启动资金。
There's a vast chasm between these tinkerers and those with access to a traditional lab.
这些修补匠与传统的实验室研究人员之间有着巨大的鸿沟。
If that isn't a multi-functional tablet computer with access to remote data servers, what is?!
如果这还不是访问远程服务器的平板电脑的话,那是什么? !
As a result, local applications were typically trusted with access to all system resources.
因此,本地应用程序通常受到信任可以访问所有系统资源。
Partner offerings provide WebSphere Information Integrator with access to other sources as well.
合作伙伴产品还为DB 2Information Integrator提供了对其他数据源的访问。
The fund could be structured as a bank, with access to emergency funding from the Federal Reserve.
这类基金可以像银行般构建,并获取美国联邦储备委员会(简称美联储)的紧急拨款。
The simplest way to provide users with access to reports from your application is to use a hyperlink.
为用户提供从应用程序访问报表的权限的最简单方法就是使用超级链接。
With access to credit all but choked off and global demand falling, firms are keen for any help they can get.
在几乎无门获得信贷且全球需求下挫情势下,各公司热盼任何他们可以得到的帮助。
An online policy is used for encrypting data written to a file system and protecting data with access control.
在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。
Including people with disabilities and providing them with access to health and rehabilitation services is vital.
使残疾人融入并向他们提供获得卫生和康复服务至关重要。
But for most, solar panels are more or less a commodity, which favours big producers with access to cheap capital.
而对大部分公司而言,太阳能电池板或多或少是一种商品,对那些能够获得廉价资本的大公司是有益的。
With access to the U.S. market through the HOPE II Act, Haiti can create jobs in its apparel and agriculture sectors.
海地可以凭借《海地机会伙伴促进法案II》(HOPE II)进入美国市场,借此在服装业和农业领域创造就业机会。
Combining an SOA with DB2 databases, PODS provides 2,000 doctors and 3,000 nurses with access to patient records.
通过结合使用SOA和DB 2数据库,PODS支持2,000名医生和3,000名护士访问患者记录。
Whether used together with access to SQL tables or used separately, this can greatly simplify application development.
无论是与对sql表的访问一起使用,还是单独使用,这都可以大大简化应用程序开发。
Anyone with access to the public key can use it to encrypt messages, which can then be decrypted only by the key owner.
任何访问这个公开密匙的人都可以用它加密消息,而只有密匙所有者才能够对消息解密。
The solution should provide an authenticated user with access to a provisioned set of services based on the user's role.
该解决方案应该基于用户的角色,为经过身份验证的用户提供对所供应的服务集的访问。
After completing these steps, you can provide the user with access information to the newly created virtual machine.
完成这些步骤之后,就可以让用户访问刚创建的虚拟机了。
With access to a PC she could dispense with her reliance on her granddaughter and make new friends around the world.
通过一台个人电脑,她能转移对孙女的依赖,并结交许多外地的朋友。
Even if Jackson did grab a syringe and misuse propofol, is Murray culpable for leaving him alone with access to the drug?
即便是杰克逊误用异丙酚并自己注射,可是把杰克逊单独留在他可以拿到药物的房间,默里是否仍然有罪?
The core layer provides a foundation upon which you build the middle layer with access, audit, and cryptographic controls.
核心层可提供用于构建具有访问、审核和加密控制的中间层的基础。
The core layer provides a foundation upon which you build the middle layer with access, audit, and cryptographic controls.
核心层可提供用于构建具有访问、审核和加密控制的中间层的基础。
应用推荐