Examples of using Data and applications in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
NASA Socioeconomic Data and Applications Center.
Data and applications moving to the cloud increase your potential exposure to threats.
End users' settings, data, and applications are not affected.
It's the primary connector between cloud-based workloads and on-premise data and applications.
Overcome the complexity of data and applications and get organized on a central T20 server.
Claims adjusters, examiners and investigators can have access to data and applications from the field.
For many users, security of data and applications in cloud computing environments is extremely important.
It protects users against threats anywhere they access the Internet, and it protects your data and applications in the cloud.
Double-Take Move begins by replicating all the data and applications on an existing AIX server to a new AIX server.
Enterprise cloud computing can also enable the mobile services that employees increasingly use when accessing corporate data and applications.
Full Device Wipes will remove all data and applications from the device.
They also integrate data and applications efficiently, and automate business processes across physical, virtual and cloud environments.
Palisades; NY: NASA Socioeconomic Data and Applications Center(SEDAC).
Given that virtually all data and applications are connected to the network, robust network security protects against data breaches.
Enroll in Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud.
Azure MFA helps protect access to data and applications while meeting the needs of users for simple sign-in.
Kingston IronKey and DataTraveler Encrypted USB drives can help financial teleworkers safely access data and applications from home.
Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
Powerful real-time replication, combined with full-featured continuous data protection(CDP), replicates all your data and applications to a local or remote recovery server.
A common hybrid cloud strategy is to deploy sensitive data and applications on private cloud servers while outsourcing less critical workloads to cost-effective public clouds.
Today, thousands of enterprise and infrastructure companies rely onUtimaco to guard IP, critical business data and applications against internal and external threats.
Adopting cloud servicescan accelerate your business, but moving data and applications to the cloud—whether it's public cloud, hybrid cloud, or private cloud —also increases your potential exposure to threats.
Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud via Coursera.
Linking classic with cloud-native IT is fundamental to sharing data and applications, making them accessible throughout your entire IT environment.
For many of these companies, the explosive growth of technologies, data and applications is severely taxing existing 1GbE infrastructures and affecting performance.
Use real-time visualizations to monitor and optimize employee access to data and applications- with SAP Cloud Identity Access Governance, access analysis service.
Under Attack? DDoS protect As you take advantage of cloud services to move more data and applications online, distributed denial of service attacks(DDoS attacks) become an increasingly dangerous threat.
Of all that cloud computing promises- elastic information technology(IT)infrastructure, fast deployment of data and applications, greater productivity, improved cost control, support for mobility- being able to quickly execute new strategies and then determine their success is no small advantage.
VMware ACE is a breakthrough product that enables IT desktop managers to create a standard PC environment including operating system, data and applications, wrap it with IT policies to protect the contents, package it into a virtual machine and deploy it to any managed or unmanaged PC endpoint.
VMware ACE is a breakthrough product that enables IT desktop managers to create a standard PC environment including operating system, data and applications, wrap it with IT policies to protect the contents, package it into a virtual machine and deploy it to any managed or unmanaged licensed PC client.