Examples of using User-based in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
The current quota settings are user-based.
Support for both user-based and public(no account required) submission and distribution.
Note: For installations on a terminal server,licensing is user-based.
Traffic is a user-based metric because it's related to the user's activities.
Moz conducted a study to determine how these user-based metrics correlate with search rankings.
Enable user-based access requests and approvals without involving the help desk.
Ekran System helps companies of any size to build their strategies of mitigating user-based security risks.
You must use either all user-based authentication methods or all computer-based authentication methods.
When concepts for lifttruck features are developed, these are evaluated with customers for important user-based feedback.
User-based, agile design and product/service development methods ensure the sound outcome of the projects….
You can further control access to your broadcast by setting user-based passwords with your web server htaccess files.
Uses host-based, user-based, and cryptographic security techniques to control access to standard network services.
Whether you're getting the majority of your site visitors from social media channels, direct sources orpaid traffic, these user-based activities will send a signal to Google.
Customisation: The platform provides for user-based customisation on multiple fronts such as indicators, Expert Advisors etc.
A user-based voting system and a large active community is its biggest advantage over many torrent websites acting only as index systems.
Since 2009 GETRAG(Jiangxi) has purchased more than 20JUNKER grinding machines and rewards the JUNKER user-based solution recommendations with the"Best Supplier Award.
These user-based metrics are interactive, as opposed to static features such as meta description, title tag length, etc.
The integration of Google Remarketing therefore allows an enterprise to create user-based advertising and thus shows relevant advertisements to interested Internet users.
With this knowledge, you can proactively align application usage with your business requirements. User-Based Policy Control.
Content Control Flexible, user-based monitoring and control of keyword content and downloadable content, including files types via FTP, HTTP, or HTTPS.
Windows XP has major issues with its handling of IP address changes that result from user-based 802.1X authentication that changes the VLAN and thus subnet of clients.
User-based policy controls can be assembled based on the application, which category and subcategory it belongs in, its underlying technology, or the application characteristics.
This achievement is consistent with the history of SUS and the tendency toward the universalization of the right to health and a comprehensive,territorial and user-based approach to care.
One of the main techniques of a recommender systems is the collaborative filtering(user-based) which recommends products to users based on what other similar people liked in the past.
User-based application policies enables custom-tailored application control to be added to any user, group, or network policy with the option to also apply traffic shaping.
Due to these several meanings, five approaches are proposed by, encompassing all the as meanings of quality: transcendental; product-based;production-based; user-based; and value-based.
It relies on client-side andserver-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.
Because user-based registry settings are loaded from a user-specific path rather than from a read-only system location, the registry allows multiple users to share the same machine, and also allows programs to work for less privileged users.
Visibility into application usage means you can quickly analyze the role andrisk of applications and who is using them, and then translate that information into user-based safe application enablement policies.
The use of Online Services is granted in a named user-based mode, i.e., is authorized for a single user identified with a unique username and password to use the Online Services from a single machine at any given time"Named User.