英語 での To secure access の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Wanted to secure access to middle eastern oil.
Multiple Manager accounts can be setup to secure access to the clock.
How to secure access to your GrabzIt callback handler so that only GrabzIt can access it.
Multiple Manager accounts can be setup to secure access to the clock.
Said their company permits third party access to payment data andof these only 34% utilize multi-factor authentication to secure access.
By signing onto ALBA, Zelaya was able to secure access to credit lines, energy and food benefits.
These protocols largely negate the transparency of IP/TCP,making it far harder for spoofers to secure access.
Choosing an open system is one of the best ways to secure access to the most up-to-date technology, materials, partners and prices.
In order to secure access to the Red Car lines that used to criss-cross Los Angeles and ended in Long Beach, Pacific City ceded enormous power to railroad magnate Henry E.
In Mozambique,civil society groups gained a law in 1997 entitling women to secure access to land and property.
Its efforts to develop a larger overseas footprint- particularly to secure access to ports and other facilities- have created greater international suspicion of its motives and designs.
A failing public distribution system and pervasive corruption in the delivery of public services hadforced people to seek alternative means to secure access to basic economic and social rights.
The ICRC seeks to speak to all sides involved in war to secure access for humanitarian assistance and to ensure respect for the rules of war.
However, you can easily curb internal threats by simply establishing“automatic& enforceable” security policies,advising end-users to adhere to secure access protocols with trusted credentials.
Take advantage of the Azure backbone network to secure access to your premium Azure Service Bus namespaces and standard and dedicated Azure Events Hubs offerings on all public regions.
Built-in security features protect against malware and viruses and help to secure access to personal information and corporate data.
As a large copper and molybdenum mine development in which Japanese companies hold 100 percent interest, the Project is utilizing the full range of functions provided by Japan's major governmental institutions related to the natural resources sector, JBIC, NEXI, and JOGMEC,under the"one-stop-shop" structure2 adopted in the Japanese government's effort to secure access to mineral resources overseas.
Below are some examples: Hosted diameter edge agent:it's a diameter gateway to secure access to the customer's network from external networks.
President Yoweri Museveni, who is widely credited for integrating Uganda into world markets, has said that globalization is“the same old order with new means of control, new means of oppression,new means of marginalization” by rich countries seeking to secure access to developing country markets.
Evidian Enterprise SSO combined with strong authentication andMobile E-SSO were chosen to secure access, increase user satisfaction and productivity, reduce calls to the helpdesk related to password troubles.
This addition to§ 1 in the transplant law is an implementation of article 1.1a of the Convention which clearly ratifies one of the main purposes of the Convention and serves to complement the first sentence of§1 which states that the purpose of the law is to secure access to organs for transplant and respect and care for donors.
Office 2013 Home and Student also comes with 7GBonline storage which can be used to secure access to any of the user's documents anywhere.
About MobileIron MobileIron is redefining enterprise security with the industry's first mobile-centric,zero trust platform built on the foundation of unified endpoint management(UEM) to secure access and protect data across the perimeter-less enterprise.
From my experience, however, of visiting survivors at evacuation shelters in coastal areas of Miyagi Prefecture just after the Great East Japan Earthquake, I have become keenly aware of the need to create other strategic systems as well,such as systems to provide medical resources, to secure access to hospitals, and to save those who are at risk in health issues even though they may not be severely hurt.