Examples of using Endpoints in English and their translations into Russian
{-}
-
Official
-
Colloquial
Tunnel Endpoints- Custom Configuration.
Hazard assessment for endpoints of concern.
Other endpoints require no additional configuration.
Hazard assessment for endpoints of concern.
For this variation, a convex curve may have endpoints.
Endpoints can also be translated via the Store URLs tab.
Links are visible andcan be followed from all endpoints.
Values of these modelled endpoints are listed in Annex 1.
Total trip time was 33-34 hours,depending on the endpoints.
More details about the endpoints in the WooCommerce official documentation.
Click Clear to clear the list of DCOM protocols and endpoints.
If you are using a tunnel, specify the endpoints on the Tunnel Settings tab.
Add rate limit for outbound connections at tunnel endpoints.
The most sensitive toxicity endpoints for SCCPs are summarized in Table 2-4.
A better place through canonical data models to communicate between endpoints.
Webinar Why are Endpoints Such Juicy Targets for Ransomware?
Comprehensive comprehensive protection for endpoints and Exchange servers;
Network sockets are endpoints in connections across a computer network.
The participants were followed for CV endpoints until March 2008.
Endpoints were located in premises without access to high speed Internet.
Instead, this function is assigned to the endpoints of each communication session.
The two range endpoints must use the same IP version, either IPv4 or IPv6.
In the risk assessment for earthworms, the following toxicity endpoints were used.
The fugitive is caught when both endpoints of his edge are occupied by searchers.
Secondary endpoints included investigator assessment and examination of scalp photographs.
Added logic to optimize automatic check-in interval based on number of endpoints.
Effects on other endpoints have been described at lower concentrations, including.
The viewneo API plugin gives you full access to the REST API endpoints of the viewneo CMS application.
Other endpoints that would be acceptable, such as growth or survival, were not affected.
Security of network perimeter and endpoints in the SSTC is ensured by"Check Point" company.