Examples of using Shared access in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Using Shared Access Signatures.
Certain spectrum will be allocated for shared access.
Shared access signature(SAS).
Multi-user shared access(MUSA).
Shared access to these services can increase their impact.
Both block blobs and page blobs support Shared Access Signatures.
Identifies shared access credentials in one minute.
For detailed information, refer to Using Shared Access Signatures(SAS).
A shared access signature(SAS) provides delegated access to resources in your storage account.
All access to information is tracked through named accounts(i.e. shared access accounts are not permitted).
High-performance shared access to storage allows editors to share files and speeds up production workflow.
One of the most commonly used policies in the ECLAC region for dealing withthe" digital divide" is based on the shared access model.
The StorNext File System provided immediate benefits,including shared access to files and rapid processing for a smooth workflow.
This category includes public APIs provided by online services, such as credit card processing systems,or OAuth for shared access to user data.
Unlicensed access in 64- 71 GHz, and shared access in 37 GHz- 37.6 GHz, with all ranges expected to support multiple 5G use cases.
Have the flexibility to support a company's data transparency initiative orto provide shared access to clinical trials data from multiple companies.
Shared access to specialized tools, such as counter-terrorism-related centralized databases and forensics capacities, is essential for the prevention of terrorism.
G GPON is a 10Gbit/s PON technology that is fastbecoming standardized for use on Fiber to the Premises(FTTP) shared access fiber optics.
Shared access involves automatic synchronization of folder information whenever a folder is changed on the server, and may provide server side file searching, while file transfer is a more rudimentary service.
They knew that Multics was a dead-end,but they had discovered the possibilities opened up by shared development, shared access, and real-time computing.
The recently completed specification, ETSI TS 103 379 addresses information elements andprotocols for the operation of Licensed Shared Access in the 2 300 MHz- 2 400 MHz band.
Community members share access to data and applications in the cloud.
Logically, DB data is placed on data chunkstorage servers that all DB servers can share access to.
It can realize Internet connection sharing in home wireless network,and realize wireless sharing access of ADSL, Cable modem and community broadband.
But, the contracts note, if users do share access then they're responsible for the actions of that third party.