Examples of using Hardware-based in English and their translations into Hungarian
{-}
-
Financial
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Programming
-
Official/political
-
Computer
Implementation of split-horizon DNS can be accomplished with hardware-based separation or by software solutions.
Impact of action: Older hardware-based solutions may require upgrading to support these newer technologies.
It is FIPS 140-2 Level 3 certified anduses 256-bit AES hardware-based encryption in XTS mode.
UV500 SSD with its 256-bit AES Hardware-based encryption and support for TCG Opal 2.0 won three additional awards.
As the number of networked functions grows,this means more and more hardware-based tests are necessary.
Introduced new, hardware-based, two-factor authentication devices, so called tokens for signing transactions managed via the Electra client program.
Sensitive data isstored with encryption of adequate strength, using hardware-based hardware support for their encoding.
Dedicated, hardware-based cryptographic key storage using AWS CloudHSM, allowing you to satisfy compliance requirements.
With Credential Guard,Windows 10 protects corporate identities by containing them in the hardware-based secure execution environment.
Thanks to the dedicated, hardware-based encryption key storage, AWS CloudHSM allows you to meet the compliance requirements.
MP rear camera with Sony's fourth generation BSI sensor,a large F2.0 aperture, hardware-based HDR, and a dual LED flashlight.
As well as hardware-based system fail-safe functions and a hardware cryptography module that can be used to encrypt and decrypt communications data.
Do-it-yourself software-defined storage canradically decrease costs compared to on-site hardware-based solutions.
In preparing the Report, the NMHH analysed the results of long-term hardware-based measurements it carried out concerning the quality characteristics of Internet services at subscribers signed up at szelessav.
DriveLock File Protection encrypts sensitive information reliably and-thanks to the support of hardware-based encryption(AES NI)- quickly.
By analogy, in network security a firewall is a software- or hardware-based system that works as a gatekeeper between trusted and untrusted networks or its parts.
One of the most simples is the DNS load-balancing; there are software based solutions like LVS andto serve the biggest projects hardware-based solutions are available on the market.
DataLocker SafeStick offers affordable security with 256-bit AES hardware-based encryption in XTS mode that provides always on protection for your data and REQUIRES central management with SafeConsole.
The Kingston DT6000 utilises patented Secured bySpyrus technology which supports 256-bit AES hardware-based encryption using XTS block cipher mode.
Dual 100 BaseT Ethernet ports with a hardware-based Ethernet switch, advanced XML capabilities for configuration and custom applications and a PoE class 1 rating are just some of the many features this very affordable SIP phone has to offer.
Balances( interest-bearing or not)representing prepaid amounts in the context of« hardware-based»( e.g. prepaid cards) or« software-based» e-money.
The 850 PRO's SED technology includes an AES-256-bit hardware-based, full disk encryption engine that secures your data without the usual performance degradation and complies with the TCG™ Opal v2.0 standards, protecting PSID, and is compatible with the Microsoft® eDrive IEEE® 1667 protocol.
The HP EliteBook 850 G5 protects you from future malware threats withautomatic error correction as well as hardware-based and management-friendly security solutions from HP.
In accordance with the PSD2 requirements,GoodID uses multifactor authentication, hardware-based cryptography, and anti-phishing protection, thus enabling the strong Know Your Customer(KYC) authentication of new and existing customers in the banking and fintech sectors.
Enterprise network environments that have a large number of network segments anda wide range of performance requirements might need a variety of hardware-based routers to perform different roles throughout the network.
LIABILITIES 9 9e 9.1 e Deposits( all currencies) Euro Overnight deposits Of which, e- money 9.1.1 e Hardware-based e-money 9.1.2 e Software-based e-money 9x 9.1 x Foreign currencies Overnight deposits Of which, e-money 9.1.1 x Hardware-based e-money 9.1.2 x Software-based e-money E3 E4 E1 E2.
Standalone security has improved with the proliferation of small, inexpensive, hardware-based firewall routers that protect, to some degree, the Standalone machines behind them.
The USB 2.0 portable hard drive delivers FIPS 140-2,level 3 hardware-based AES 256-bit encryption through a dedicated cryptographic processor, supports up to 10 secure user accounts, and features advanced management capabilities through the optional IronKey ACCESS Enterprise by DataLocker device management console.
IP Services software provides a broader set of enterprise-class features,including advanced hardware-based IP Unicast and IP Multicast routing, as well as policy-based routing(PBR).
Operators will be able to partner with manufacturers ofAndroid TV devices to deliver new hardware-based functionality as well as niche over-the-top programming, or deploy additional applications within the Android operating system.