Приклади вживання Endpoints Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Primary Safety Endpoints.
Endpoints of US highway 12.
Share your project endpoints.
Historic101. com Endpoints of U.S. Highway 101.
Continuity of functions at endpoints.
Total spend on endpoints and services will touch US$2 trillion this year.
Primary Effectiveness Endpoints.
A move defines endpoints for a data transport taking place in a transport bus.
These events are also termed endpoints.
Endpoints need only be connected over a broadband connection across the Internet.
Intergroup difference in PSQ baseline and endpoints was unreliable.
Endpoints on this route could be in any towns in Europe, Ukraine, Russia, Kazakhstan or China.
SATA cable consists of two equal endpoints on a thin data cable.
A better place through canonical data models to communicate between endpoints.
Addresses issue where surround sound audio endpoints reverted to stereo after restarting.
The protocol is used for establishing and controlling media sessions between endpoints.
Note that you cannot change the endpoints of a wire this way- wiring integrity is preserved.
To calculate the function values at critical points and the endpoints of the interval.
You can share your project endpoints by setting your project as public, or can you keep it private.
Similarly, each of the edges in Ghas a probability p2 of remaining in H since both endpoints need to stay in H, therefore E= p2e.
The endpoints or endpoint devices, on the other hand, bear some amount of responsibility for their own security as well.
On the other hand, if another rod is at rest in S, then its endpoints are located upon the ct axis and the axis parallel to it.
Thus, the IP tunnel endpoints become native IP routers that establish a standard IP route between the source and destination networks.
The security software authenticates logins made from the endpoints and simultaneously updates client software when needed.
Segments that empower making endpoints that collaborate with the outside world for procuring and transmitting messages.
Similarly, the secure shell remote login program checks digital certificates at endpoints(if known) before proceeding with the session.
A trial might also define one or more secondary endpoints such as progression-free-survival(PFS) that will be measured and are expected to be met.
The security software authenticates logins made from the endpoints and simultaneously updates client software with the latest when needed.
Endpoint security management is all about enough securing such endpoints and thereby securing a network by blocking access attempts and such risky activities at endpoints.