영어에서 Local proxy 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
The local proxy sends the cache set up to the host server 954.
SetLocalProxy($proxyUrl)- sets the local proxy server to be used for all requests.
The local proxy 175 can synchronize the network use by performing the batched data transfer for all connections simultaneously.
SetLocalProxy(string proxyUrl)- sets the local proxy server to be use for all requests.
In addition, the local proxy can determine a value for(t0), or a mutual starting point for each poll among various services.
The modified parameter can be determined by the local proxy 275 and communicated to the proxy server.
At this point, the local proxy 765 replies to the application 755 again with the transient cache in step 744.
The poll schedule can be generated, for example, by the local proxy and sent to the proxy server 325.
In some embodiments, the local proxy 175 may be bundled into a wireless model, a firewall, and/or a router.
In general, the host server 485 can perform this monitoring independently of the widget 455 or local proxy 465 operations.
In some instances, the local proxy 175 is optionally customizable in part or in whole to be device specific.
Further in one embodiment, the application behavior detector 236 of the local proxy 275 further includes a poll interval detector 238.
In one embodiment, the local proxy 275 locally adjusts radio use on the device 250 by caching data in the cache 285.
Similarly, the blacklist manager 201 can be partially or wholly internal to local proxy or the application behavior detector 236.
The local proxy 275 generally represents any one or a portion of the functions described for the individual managers, modules, and/or engines.
In one embodiment, if a request is marked for monitoring, the local proxy 465 can now store the results into the local cache.
When the local proxy communicates this data back to the services, there may be delays in that data arriving and the delays can vary among the services.
Puri made it clear these local Watson incarnations do not just forward API calls from a local proxy into IBM-hosted Watson.
In general, the local proxy 175 and the proxy server 125 are transparent to the multiple applications executing on the mobile device.
The application blacklist manager 201 can be coupled to the application cache policy repository 243 and can be partially or wholly internal to local proxy or the caching policy manager 245.
In some instances, the local proxy can recognize requests made outside of this schedule, consider them“manual,” and treat them accordingly.
When all services(e.g., mobile clients ormobile applications) communicate their polling intervals to the client(not to each other) the local proxy 175 or 275 will see the overall picture.
A branch of the Zeus botnet, creates a local proxy and enables attackers to perform cyber-espionage and promote fake news in the victim's browser.
Wherein, the proxy server is coupled to the distinct hostsof the first and second services and is further able to wirelessly communicate with the local proxy of the mobile device.
The local proxy 175 is generally transparent to the operating system or platform of the mobile device and may or may not be specific to device manufacturers.
Once you have generated the proxy address above, an example of using a local proxy will appear for every programming language we currently support with local proxies, below.
In general, the local proxy 275 continues to provide the cached response each time the outgoing request is received until the updated response different from the cached response is detected.
The connection manager 265 in the local proxy(e.g., the heartbeat manager 267) can detect, identify, and intercept any or all heartbeat(keep-alive) messages being sent from applications.
The local proxy 465, can intercept the requests made by device applications, and can identify the connection type of the request(e.g., an HTTP get request or other types of requests).
The client-side proxy(or local proxy 275) can further categorize mobile traffic and/or implement delivery policies based on application behavior, content priority, user activity, and/or user expectations.