英語 での These endpoints の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
These endpoints must be enclosed in square brackets.
In a virtual-hosted- style URL,you can use either of these endpoints.
Note: These endpoints are only available for admin users.
Client app developers then make HTTP requests to these endpoints.
These endpoints may be subject to investigator interpretation.
Your computer needs to be able to reach these endpoints and download files from them.
These endpoints are deprecated, and are removed in Kubernetes 1.14.
This means that, instead of returning all results in a single response, these endpoints might return some of the results, along with a response header that links to the next set of results.
Use these endpoints to get the number of messages sent from your channel.
Why 100,000 requests? Because this limit allows us to make concrete progress to combat inappropriate use of our developer platform,while isolating the impact to the developers using these endpoints the most.
These endpoints are protected by Symantec Endpoint Protection.
The infected files on these endpoints are detected only by network-based threat detection technologies.
These endpoints are not protected by Symantec Endpoint Protection.
The Tunnel makes requests to both these endpoints to retrieve and update a list of devices that have permission to access internal resources.
These endpoints are used by NGOs like the UN to identify, understand and counter misinformation around public health initiatives.
This change will require developers who need to access these endpoints above the 100,000 daily request threshold to go through our review process to ensure their use cases are compliant with our policies.
These endpoints are negatively impacted by smoking and based on literature are expected to improve within six months of smoking cessation.
Although there was evidence of an effect of RF-EMF on some of these endpoints, the Working Group reached the overall conclusion that these results provided only weak mechanistic evidence relevant to RF-EMF-induced cancer in humans.
These endpoints are used as WordPress standard interfaces for themes and plugins to perform their specific tasks. But many vulnerable themes and plugins were out there due to lack of secure coding to use these endpoints. .
The infected files on these endpoints are detected by both network and endpoint-based threat detection technologies.
We recommend using a single certificate for all of these service endpoints in each datacenter.
Nevertheless, it is rational in many circumstances to use a treatment that improves these surrogate endpoints while awaiting a more definitiveendpoint to support its use.
When you create AWS PrivateLink endpoints for ECR andECS, these service endpoints appear as elastic network interfaces with a private IP address in your VPC.”.
Secondary endpoints included these measures at 24 hours and double-blind endpoint at day 25.