Examples of using Protocol specification in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
There are no requirements or protocol specifications in this document.
RPC protocol specification used by local applications to register monitoring requests.
The values of these fields are those defined in the DNS protocol specification.
The board supports FlexRay protocol specification 2.1 and offers downward compatibility to previous standards.
The values of these fields are those defined in the DNS protocol specification.
The I2C protocol specification states that the IC that initiates a data transfer on the bus is considered the Bus Master.
The updated Zcash core design is in our Zcash Protocol specification.
Oddly enough we have seen recent changes to the protocol specification that attempt to reverse the effect of both of these measures!
Potential exposures to attackare discussed in Section 7 of the DHCP protocol specification[RFC2131].
Protocol specifications MAY restrict usage of U+FEFF as a signature in order to reduce or eliminate the potential ill effects of this uncertainty.
Recently, however, Apple has begun to license the protocol specification for commercial implementations.
Serial communication CAN bus controller, as per CAN 2.0 and CAN FD specifications, that supports the original Bosch protocol specifications.
This document isbased on six earlier editions of the ARPA Internet Protocol Specification, and the present text draws heavily from them.
The technical details of 6rd are available in RFC5969,“IPv6 Rapid Deployment on IPv4 Infrastructures(6rd)- Protocol Specification”.
Releasing the Thunderbolt protocol specification is a significant milestone for making today's simplest and most versatile port available to everyone.
In this case, the contents of this extension are defined in the protocol specifications for the suported services.
Releasing the Thunderbolt protocol specification is a significant milestone for making today's simplest and most versatile port available to everyone.
Earlier this month SSH Communications Security Corp.announced that the Secure Shell protocol specifications have reached Proposed Standard status.
CIM-RS Protocol Specification HTTP content negotiation: Negotiation between HTTP clients and HTTP servers to determine the format of the content transferred.
The first step, Cipher Suite Negotiation, allows the client and server to choose a Cipher Suite supported by both of them.The SSL3.0 protocol specification defines 31 Cipher Suites.
The URL that is configuredwithin the policy requires the protocol specification, meaning the protocol portion of the URL, https:// for example, cannot be specified by a variable.
Currently, ftpd will only honor PORT commands directed to unprivileged ports on theremote user's host(which violates the FTP protocol specification but closes some security holes).
Releasing the Thunderbolt protocol specification in this manner is expected to greatly increase Thunderbolt adoption by encouraging third-party chip makers to build Thunderbolt-compatible chips.
If you plan to implement the server-side processing by yourself, typically,the server team and the client team decide the protocol specification at the beginning. Then, the teams develop and test the service according to the specification. .
Introduction The File Transfer Protocol specification(FTP)[PR85] provides a mechanism that allows a client to establish an FTP control connection and transfer a file between two FTP servers.
With this vision in mind, Intel now announced that it plans to drive large-scale mainstream adoption of Thunderbolt by integrating Thunderbolt 3 into future Intel CPUs andby releasing the Thunderbolt protocol specification to the industry next year, under a nonexclusive.
(When I asked Cao Gadgets about future HomeKit compatibility, they said that Apple's Made For iPhone/iPad(MFi) program requirements were prohibitively expensive and that the software approach-the HomeKit Accessory Protocol Specification- is either only for non-commercial products or MFi licensees, which seems to be true.).
Such risks might arise from compromise in a related protocol(e.g., IPsec is useless if key management has been compromised), from incorrect implementation, compromise of the security technology used for risk reduction(e.g., a cipher with a 40-bit key),or there might be risks that are not addressed by the protocol specification(e.g., denial of service attacks on an underlying link protocol). .