영어에서 Policy implementation 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
In order to protect resources and the environment,control and gradual opening policy implementation plan.
In some embodiments, the policy implementation agent 1690 performs traffic inspection and characterization.
This resource features detailed country-level data on education systems and education policy implementation.
RSoP is an addition to Group Policy that makes policy implementation and troubleshooting easier.
In some embodiments, the device service history 1618 is used to assist in verifying service policy implementation.
A through 27G provide tables summarizing various device based service policy implementation verification techniques in accordance with some embodiments.
In some embodiments, the device service history 1618 is used to assist in verifying service policy implementation.
This is especially useful when it comes to policy implementation on public networks that get a lot of traffic, but that still need to maintain security and protect data.
Measurement point III resides between the IP queuing and routing layer and a policy implementation agent layer.
This approach, for example, provides a second layer of service policy implementation verification that strengthens the service usage or service activity measurement verification.
In some embodiments, the device service history 1618 is used to verify billing records and/or billing policy implementation.
More detail on specific embodiments for the policy implementation agent 1690 is provided below with respect to the figures associated with communication stack and communication protocol flow.
Still other students could become specialists in international relations, turning their knowledge to policy implementation or peacebuilding efforts between nations.
In addition to proactive monitoring and faster point-of-sale policy implementations, the solution enabled the world's"Largest Cash Transfer Benefit Program"(per the"Guinness Book of World Records"), with direct benefit transfers affecting more than 80 million households.
Unify and simplify management and operations for your hybrid container environment with a single tool, rather than multiple disparate tools and policy implementations.
In various embodiments, the verification embodiments discussed herein for service policy implementation verification or service policy implementation compromise protection can be applied.
For example, the access control integrity server 1654 can cross check this information to identify integrity breaches in the service policy implementation and control system.
For example, in the case of wireless networks,the incorporation of device assisted service policy implementation architectures can result in base stations that directly connect to the Internet local loop and the data traffic does not need to be concentrated into a dedicated core network.
In some embodiments, the network control plane servers detect anetwork connection change and initiate the service policy implementation established for the second network.
In some embodiments, this approach has certain advantages from a service policy implementation verification or compromise protection robustness perspective, or has certain advantages from a communications protocol efficiency perspective, or simply can be more efficient to implement.
In some embodiments, the access control integrity agent 1694 also cross checks this information to identify integrity breaches in the service policy implementation and control system.
This feature is useful for government, airport, retail anduniversity campuses and means easy policy implementation in environments where data privacy, separation, and network security are critical.
In some embodiments, packet inspection is aided by literal orvirtual application layer tagging while in other embodiments packet inspection is performed entirely in/by the policy implementation agent 1690.
In some embodiments, the decision to switch to the Wi-Fi LAN associated with a trusted wire line access network can be made automatically by the device based on the policy implementation rules settings for the modem selection and control 1811 and/or the policy control agent 1692, can be made by the user, or can be made by the service controller 122.
In some embodiments, the service control server link 1638 includes the agent heartbeat function in which the agents provide certain required reports to the service processor for the purpose of service policy implementation verification or for other purposes.
To best serve our customers, IOCL has put in place a real-time framework for dynamically analyzing point-of-sale data and faster point-of-sale policy implementations, ensuring better controls, monitoring stocks to prevent market'dry out' situations, complying with government regulations, and setting the stage for leveraging next-generation technologies that will enhance the customer experience.".
In some embodiments, the application interface agent 1693 transmits or receives a service usage test element to aid in verifying service policy implementation, service monitoring or service billing.
As another example, if one or more aspects of upstream traffic usage measurement point II, which represents the upstream demand side of policy implementation agent 1690, is inconsistent with upstream traffic measurement point III, which represents delivered traffic from the policy implementation agent 1690, then the policy implementation agent 1690 may not be operating properly.
For example, total data transmitted and/or received, traffic downstream and/or upstream speed, overall traffic usage by time of day are generally not considered private from theservice provider's perspective and are necessary in many basic service policy implementations.
In some embodiments, the application interface agent 1693 is used to literally tag orvirtually tag application layer traffic so that the policy implementation agent(s) 1690 has the necessary information to implement selected traffic shaping solutions.