영어에서 Control policies 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Comprehensive access control policies.
Finally, export control policies risk imposing substantial costs on the private sector.
Comprehensive security control policies.
Access control policies can be created and enforced based on user identity, group membership, access method, geo-location and several other factors.
Comprehensive security control policies.
Combine identity and device management,enforcing access decisions based on user authentication, device location tracking, and granular control policies.
Rationalising Internet Control Policies.
The strict and racist border control policies had a negative impact not only on the Chinese alone but on whites and other races as well which lasted for about thirty years;
The risk is prompting legislators to enact control policies to protect investors.
Good health issupported by a well-resourced, universal healthcare system, substantial gains in reducing deaths from road accidents, and world-leading tobacco control policies.
We use SSL when necessary and have strict access control policies within our organization.
By codifying the Internet control policies and concentrating the power to one body, China is likely to exert more aggressive posture with more efficiency in governing the domestic cyberspace.
Pen and ink changes should be made in accordance with your company's document control policies.
In some embodiments, these service control policies are implemented in the network equipment.
Da Costa e Silva said this flourishing illegal trade undermines tobacco control policies and public health.
All healthcare organizations have infection control policies and procedures, and take every protection to evade infections.
A comprehensive dashboard empowers administrators to discover risky applications used in the network, track user activity, and set access control policies on sanctioned and unsanctioned IT applications.
However, due to operational requirements,inventory control policies and a varying degree of"no-show" customers, there will be times when you cannot be accommodated on your booked flight.
In some embodiments, QoS for DAS techniques include verifying that the device is properly implementing the QoS traffic control policies, for example, in accordance with a service plan.
To configure device access control policies in Citrix Gateway connector for Exchange ActiveSync To configure the access control policy you want to apply to your managed devices, do the following.
Use Identity Services Engine to create flexible, role-based access control policies that dynamically segment access without added complexity.
Export control policies risk interfering with the economic aims of global tech companies, obstructing the scientific aspirations of researchers, and offending allies by making the United States seem overly nationalistic and aggressive.
You could not easily apply and update access control policies for related resources.
When you use ShareFile with those XenMobile editions, XenMobile provides ShareFile with single sign-on(SSO) authentication of mobile productivity apps users,user account provisioning based on Active Directory, and comprehensive access control policies.
Quickly identify out-of-compliance devices, apply the latest security patches and automate access control policies based on user behavior. COMPARE New Reports of Entire Environment.
But unlike tobacco control policies, which included both legislative and non-legislative interventions, the federal government has gone for a“light touch” approach, including the voluntary Health Star Rating food labelling scheme, social marketing campaigns and school sports programs.
So we asked in our research: What would happen if current low natural gas prices or pollution control policies caused all U.S. coal-burning power plants to be replaced by natural gas generators?
Yesterday in a debate on the government's Tobacco Control Plan in the House of Commons, Sir Kevin Barron highlighted the gulf between the UK and Ireland, two countries with identical traditional tobacco control policies but with differing approaches to e-cigarettes.
For example, the controls for how to update cache, set service control policies, and other controls can be defined by any number of VSP entities including the user through a website service.
SteelConnect Switches& Access Points: A line of remote LAN switches andWi-Fi access points that support zero-touch provisioning, automate global enforcement of access control policies and provide complete visibility into connected users and devices.