Examples of using Protected infrastructure in English and their translations into Russian
{-}
-
Official
-
Colloquial
Viewing protected infrastructure of a ksc cluster.
In the Properties: window,select the Protected infrastructure section.
View the protected infrastructure of the KSC cluster to which the virtual machine you need belongs see the section"Viewing protected infrastructure of a KSC cluster" on page 49.
In the Properties: window,in the list on the left, select the Protected infrastructure section.
Thus all virtual machines within the protected infrastructure of the KSC cluster are assigned identical protection settings.
A protection profile is assigned to VMware inventory objects within the protected infrastructure of a KSC cluster.
Kaspersky Security uses a view of the protected infrastructure of the KSC cluster in the form of a tree of VMware ESXi hosts and VMware clusters(Hosts and Clusters view) for details see VMware product documentation.
VMware inventory objects that are part of this VMware vCenter server form the protected infrastructure of the KSC cluster.
The protected infrastructure of the KSC cluster is shown in the right part of the window: VMware vCenter server, Datacenter objects, VMware clusters, VMware ESXi hypervisors that are not part of the VMware cluster, resource pools, vApp objects, and virtual machines.
VMware inventory objects that are part of this VMware vCenter server form the protected infrastructure of the KSC cluster.
Accordingly, a policy is applied to all SVMs that are part of the KSC cluster anddefines the protection settings of all virtual machines that are part of the protected infrastructure of this KSC cluster.
During their operation, SVMs contact the VMware vCenter server to obtain information about the VMware protected infrastructure about hypervisors and virtual machines deployed on each hypervisor.
The protection settings specified in the root protection profile are assigned to all virtual machines belonging to the protected infrastructure of the KSC cluster.
The next direction is the implementation of the digital Silk Road,which provides a high-speed protected infrastructure, transmission, storage, processing of data.
Additional actions are needed in order to meet the 2020 and2050 targets for protecting infrastructure and cultural heritage, as there were no substantial changes in corrosion compared with the exposures in 2005- 2006 and 2008- 2009.
A key issue here is the ability to obtain foreign investment in capital-intensive infrastructure projects,while at the same time providing sensitive public services and protecting infrastructure perceived as being of strategic importance for national safety and security.
There is extensive knowledge and many technical skills and abilities that are known to minimize disaster risks by mapping areas of extreme risk,by strengthening buildings, protecting infrastructure, and setting standards of construction.
Particular emphasis has been placed on the risk of and vulnerability to floods and droughts, to increasing water capture andforest cover in 75 ecotourism circuits and protecting infrastructure from extreme climate events.
ICP Materials has specified targets for protecting infrastructure and cultural heritage for 2020 and 2050 see ECE/EB. AIR/WG.1/2009/16.
In the short term, the key issue is how to protect infrastructure investment, especially in countries with fragile fiscal positions.
Its promotion of urban planning as a tool to protect infrastructure and promote resilience against disasters was actively supported by her country, which had recently experienced severe flooding; Thailand encouraged UN-Habitat to coordinate with other relevant convention secretariats in carrying out its activities.
General changes in law may be regarded as an ordinary business risk rather than a risk specific to the concessionaire's activities andit may be difficult for the Government to undertake to protect infrastructure operators from the economic and financial consequences of changes in legislation that affect other business organizations equally.
DHS: Protected Critical Infrastructure Information Program.
Analysing and securing critical infrastructure and protected systems.
In order to protect the investment of the company Open Technologies protected the existing IT infrastructure to the maximum.
The Protected Critical Infrastructure Information(PCII) Program, part of the Department of Homeland Security's National Protection and Programs Directorate, is designed to encourage private industry to share its sensitive security-related business information with the Federal Government.
INFRASTRUCTURE Development of infrastructure at protected areas.
Measures to protect infrastructure should be strengthened, warns Kaspersky.
He continued by stating,"civilian infrastructure is protected.
Access cannot be preserved unless health workers and health infrastructure are protected. .
