Examples of using Security-sensitive in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Seaports are security-sensitive and highly complex organisms.
SANtricity software also supports FIPS-certified hard drives for security-sensitive customers.
Seaports are security-sensitive and highly complex environments.
These embedded systems are subject toreal-time requirements; they are distributed systems used in security-sensitive applications.
What types of security-sensitive activities are you going to be using your smartphone for?
Optimising security processes for access to security-sensitive areas at commercial airports.
And the wired data connection ensures safe data exchange that(unlike Wi-Fi)meets the high standards of banks and other security-sensitive bodies.
You might choose to add your own security-sensitive user groups to the Denied List.
GrabCAD relies on best-in-class network architecture, built to satisfy the requirements of the most security-sensitive organizations.
I have been looking for a connection to security-sensitive projects that Lorraine's company has been working on.
Complete visibility and control over goods, assets, people, processes,and places in even the most complex, security-sensitive T& L scenarios.
Administrators and those in security-sensitive environments can be comforted in the knowledge that the X display system no longer requires root privileges to run.
Android devices utilize a trusted execution environment(TEE), to run privileged or security-sensitive operations such as PIN verification and Verified Boot.
Developers of security-sensitive apps(such as those for online banking) state in their terms of use that they are not liable for errors and data loss in root environments.
Our team consists of industry veterans with deep backgrounds related to security-sensitive industries, such as finance and government agencies.
WL Digital Doorman enables secure connection to security-sensitive machines in an industrial environment where a raft of machine types with different protocols and maintenance partners is involved.
The Rules for submission of proposals, and the related evaluation, selection and award procedures32 were also revised in relation to the ethical review procedures,the handling of security-sensitive RTD actions and the evaluation scoring.
Embedded Secure Elements provide an additional protected area for security-sensitive applications such as payments and ticketing using NFC(Near Field Communication) technology.
Such applications include payment cards and security-sensitive government projects- like the electronic IDs in chip card format due to be issued in Germany from November 1, 2010, for example.
The ability to correct firmware corruptions is a new and innovative capability,and an ideal solution for security-sensitive industries including government, financial institutions, and critical infrastructure.
Although no accounts are cachedby default, adding your own security-sensitive user groups to the Denied List can protect those groups against accidental inclusion in the Allowed List, along with subsequent caching of their passwords on the RODC.
The default PRP improves the security of an RODC installation by ensuring that noaccount passwords are stored by default and that security-sensitive accounts(such as members of the Domain Admins group) are explicitly denied from ever having their passwords stored on the RODC.