영어에서 End-point 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Network, Server, and End-point.
End-Point Security and Security API Service.
In an always-on, always connected world, end-point security is crucial.
Test method: End-point, Fixed-time(two point method), kinetic.
Callout text boxes have three parts: a text box, a knee line, and an end-point line.
Consumer and provider are represented as an End-Point Group(EPG) and have a 1:1 relationship.
It delivers consistent, secure remote access to internet hosted web applications with zero end-point configuration.
To move the entire callout, click either the end-point line or an edge of the text box, and drag it.
ITbrain Support Center- find the answers to your questions How do I add end-points to ITbrain?
He said that while in one sense the iPhone X represents the end-point of a long-term goal, it is also the beginning of a new phase of development.
QRM+ also allowsfor real-time device monitoring, so you can check the status of every end-point whenever required.
Some end-point management features for Chrome use Google partner APIs to communicate between XenMobile and your G Suite domain.
Don't forget to back up your hypervisors and end-points- your CEO's laptop may have more important data than most of your servers!
Due to potential Internet issues or Email delivery restrictions, sometimes the notification may not successfully reach an HTTP or Email end-point.
Test method: End-point, Fixed-time, Kinetic Run tests in strict accordance with sample sequence, insert emergency at any time.
Attacks are becoming more sophisticated, at a time when the number of connected devices mean that potential vulnerabilities and insecure network end-points are growing exponentially.
As IP is a connectionless protocol, which means that there is no established connection between the communication end-points, packets can be sent via different routes and do not need to arrive at the destination in the correct order.
Regardless of the business or application, Vidyo's VidyoRouter architecture delivers low latency HD-quality multipoint video conferencing over ordinary data networks to any end-point.
Fully integrated Reverse Proxy User-Agent allows Sun Java System Web Server 7.0 to act as the HTTP end-point for third-party HTTP origin servers including all popular application servers.
Similarly, MOBIKE(IKEv2 Mobility and Multihoming)[RFC4555] is an extension to the Internet Key Exchange Protocol(IKEv2) that provides the ability to deal with a change of an IP address of an IKEv2 end-point.
Norton Safe Web benefits from a network of more than 20 million Norton Community Watch end-points that automatically submit in real-time suspicious URLs to the Norton Safe Web server for detailed analysis.
By real-time end-point monitoring, it is possible to know the path such as creation, deletion, and movement of internal documents, and it is easy to know the cause of leakage of internal information such as IP address and PC Name of the user's attempted leak.
Integrated Reverse Proxy Fully integrated Reverse Proxy User-Agent allows Oracle iPlanet Web Server 7.0 to act as the HTTP end-point for third-party HTTP origin servers including all popular application servers.
If we attempt to perform userbehavior analysis at the end point, we must address several challenges, including privacy compliance, a high level of expertise for large-volume data analysis, and the impact on end-point performance.
Flexible Device End-Points- View delivers a personalized, uncompromising desktop experience across nearly any end-user device, including Microsoft Windows and Mac devices, Zero Clients, Thin Clients, Kiosks and new computing platforms such as the Apple iPhone and iPad as well as Android devices.
Based on open standards cryptography, it provides SSH end-point authentication, on-the-fly data encryption(with the option to store files encrypted on the receiver's end), and data integrity verification that protects against man-in-the-middle, re-play, and UDP denial-of-service attacks.
IPv4 scarcity: Because the network end-point can only be identified with IP: Port binding, where tenants request to use the standard SSL port, 443, hosting a secure site often means offering a dedicated IP address per tenant.