Examples of using Network resource in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
QoS and charging control solution for efficient network resource management.
The maximum number of network resource pools allowed on a host is 56.
Local search query functionality may also be useful for finding information that a network resource may not access.
In this option, the network resource only sends results to the mobile communication facility 102 that cannot be found locally.
In some implementations, all or part of the network resource may be referred as a“cloud.”.
Without permission, enter into a computer information network or use any computer information network resource.
For information about creating and configuring network resource pools, see vSphere Network I/O Control.
LimitExceeded This error message indicates that the distributed switch already has the maximum number of network resource pools.
It is a type of cyber attack that attempts to make a computer or network resource unavailable against the wishes of its owner.
The method of processing objects which ends in it being physically deleted fromits original location(hard drive, folder, network resource).
The device 150 can also request the host server 100 to alter the behavior for network resource consumption based on user activity or behavior.
However, to utilize a network resource to perform a computerized task, a computer system must have some way to identify and access the network resource. .
Placement, installation, orusage of files in more than one place simultaneously, or providing access to the file through network resource to other users;
APM looks at end user application performance data, application/network resource demands, and business rules/IT metrics to assess application performance against benchmarks and identify areas for potential optimization.
Windows file or printer sharing feature,Encountered very often will not have access to XXX,You might not have permission to use this network resource。Access Denied。
If a network path is specified, PUSHD will create a temporarydrive letter that points to that specified network resource andthen change the current drive and directory, using the newlydefined drive letter.
At 816, a confirmation of the approved QoS session is received to close the loop for the QoS for DAS(e.g., a QoS schedule is received that provides theQoS session confirmation information, such as a scheduled RAB/multi-RAB and/or other reserved network resource(s) by schedule/other criteria).
CNN applies BFT over a WAN(wide area network) and requires each CN to satisfy stringent hardware and network resource requirements to carry out BFT consensus at a sufficient performance level.
Adding a network resource pool to a vSphere Distributed Switch fails with the error Cannot complete a vSphere Distributed Switch operation for one or more host members This error message indicates that one or more of the hosts on the distributed switch is already associated with the maximum number of network resource pools.
With centralized management using QRM+ on the NAS, IT infrastructure and device security is enhanced while troubleshooting and network resource performance analysis is greatly simplified.
Curvature managed services security management provides network resource access control, including: access control and monitoring; maintenance of authentication mechanisms; threat assessment; incident response; and periodic security reviews.
With centralized management using QRM+ on the NAS, IT infrastructure and device security is enhanced while troubleshooting and network resource performance analysis is greatly simplified.
Curvature managed services security management provides network resource access control, including: access control and monitoring; maintenance of authentication mechanisms; threat assessment; incident response; and periodic security reviews.
That means that a virtual encrypted disk is actually an ordinary file that can be stored on any data storage device,like a hard drive, USB-disk, CD, DVD, or a network resource, and can be easily transferred to another computer or backed up.
Another option for reducing network traffic, andtherefore reducing dependence on a good network connection, may include a network resource maintaining a current list of all content stored locally on a mobile communication facility 102.
As another example, intelligent network monitoring of the wireless network to effectively manage network service usage for protecting network capacity can include techniques for keeping PPP sessions alive to avoid the need to consume network resources to re-establish PPP sessions(e.g.,unless the application behavior analysis predicts that a mean access time is long enough for the PPP session to be dropped off and yet not causing overall network resource limitations).