谷歌的商业模式假设,人们将委托它处理更多关于他们生活的信息,这些信息将被存储在公司远程计算机的“云”中。
Google's business model assumes that people will entrust it with ever more information about their lives, to be stored in the company's "cloud" of remote computers.
它允许你从远程计算机管理你的服务器。
This allows you to administer your server from remote computers.
请回顾Wikipedia上远程计算的优点和特性。
Review the benefits and features of remote computing on Wikipedia.
网络设备资源使我们能够进行远程计算和通信。
The network facilities resources provide us the ability of remote computation and communication.
出于安全考虑,请确保不能从远程计算机执行管理活动。
Ensure that administrative activities can not be performed from remote machines, for security reasons.
安全软件能使远程计算机被“锁定”,以免考生开启未经批准的窗口。
Remote computers are "locked down" with security software, to prevent unauthorised Windows from being opened.
接下来,当您在远程计算机上运行一个命令时,又会发生什么事情呢?
Next, what happens when you run a command on the remote machine? Here's the answer.
健壮会话让用户可以连接到远程计算机,开始执行命令,然后断开连接。
Robust sessions enable the user to connect to a remote machine, start the execution of commands, and disconnect.
用这些技术提供高速LAN互连、远程计算、多媒体和增值网络业务。
These technologies are now being used to provide high speed LAN internetworking, telecomputing, multimedia and value-added networking services.
完成这些设置之后,就应该能够登录到远程计算机,系统不会提示输入密码。
With these Settings, you should be able to log onto the remote machine without prompting for the password.
正如您所预期的,运行ssh以访问远程计算机将启动一个新的登录Shell。
As you might expect, running SSH to access a remote machine launches a new login shell.
通过使用以下配置设置,可信主机上的用户就可以登录远程计算机,不需要提供密码。
Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.
远程计算是指用户在本地计算机上通过互联网利用远程超级计算机上计算资源的技术。
The traditional remote computing method is logging onto the remote machines by using telnet protocol to accomplish all kinds of work.
例如,清单3中所示的命令用于在远程计算机上运行hostname- a- v。
For example, the command shown in Listing 3 runs hostname -a -v on the remote computer.
一旦您拥有了那些进度,您就可以把测试执行部署到可以寄存在远程计算机上的虚拟用户上。
Once you have those schedules, you can deploy test execution over virtual users that can be hosted on remote computers.
这些工具可以帮助操作者阻止破坏计算机的行为或给予技术人员的能力来从远程计算机上解决恶意软件。
These tools can help block malicious software from disrupting a computer or give a technician the ability to fix a computer from a remote location.
让我们看一看如何使用所有这些元素以成功地从远程计算机上调用我们的EJB组件上的方法。
So, let's see how we use all these elements to successfully call methods on our EJB component from remote machines.
下面实现的系统将使用客户机——服务器架构以接收来自本地计算机和远程计算机的显示事件。
The system implemented below USES a client-server architecture to accept display events from local and remote machines.
请记住,根据远程Shell的配置,在远程计算机上进行身份验证时,您可能需要输入密码。
Remember that depending on your remote shell configuration, you might need to enter a password during the process to authenticate on the remote machine.
SSH除了可以作为与远程计算机之间的一种通信模式之外,还提供大多数用户不常用的其它特性。
SSH, apart from being a mode of communication to remote computers, also provides other features that most users do not use very often.
任何人都可以在您的网络或远程计算机上使用包嗅探器查看交换的信息,有时甚至可以查看密码信息。
Anybody with a packet sniffer on your network or on a remote machine can view the information as it is exchanged, sometimes even password information.
映射之后,本地端口指定的所有通信量通过一个安全的SSH隧道转发到远程计算机上的映射端口上。
Once mapped, all the traffic destined for the local port is forwarded to the remote machine on the mapped port within a secured tunnel of SSH.
parallel -slurp为每台远程计算机创建一个子目录并把指定的文件复制到此位置。
Instead, parallel-slurp creates a subdirectory for each remote machine and copies the named file to that location.
SSH的主要优点之一是,通过将您的公钥复制到一台远程计算机,您可以绕过正常的登录和密码交换。
One of the main benefits of SSH is that you can bypass the normal login and password exchange by copying your public key to a remote machine.
无论是从本地计算机还是从远程计算机建立连接后,将处理传入消息以匹配在配置文件中指定的关键字。
After a connection has been established — whether from the local or a remote machine — the incoming messages are processed for matches to the keywords specified in the configuration file.
无论是从本地计算机还是从远程计算机建立连接后,将处理传入消息以匹配在配置文件中指定的关键字。
After a connection has been established — whether from the local or a remote machine — the incoming messages are processed for matches to the keywords specified in the configuration file.
应用推荐