Examples of using Multifactor in English and their translations into Ukrainian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Grid Multifactor Authentication.
Protect Your Credentials with Multifactor Authentication.
A multifactor container transport service.
LastPass offers several multifactor options, including:.
Multifactor authentication system is gradually evolving.
Click the“Multifactor Options” tab.
Multifactor grouping taking into account the available equipment and resource potential;
If the accounts offer multifactor authentication, use it.
YubiKey Аутентификация: Enable or disable your YubiKey multifactor authentication.
On the Multifactor Options page, click Update.
Now there are two trends in the multifactor authentication.
Click the Multifactor Options tab and select Transakt.
Secure your backups with two- or multifactor authentication.
How to set up multifactor authentication for Office 365 users.
Another vendor, LogMeOnce, recently added selfie authentication to its multifactor authentication service.
Title: Multifactor non-linear regression model with feedbacks- regional climate simulation.
If the accounts offer multifactor authentication, use it.
Multifactor, multilevel concepts of peace are, as a consequence, considerably more complex than simple, absence of war theories.
Analysis and interpretation of empirical multifactor model of psychological resourcefulness of a personality.
A system approach to developing theunderground space of metropolises under conditions of uncertainty and multifactor risks.
The problems of constructing of multifactor experiment designs on the base of these sequences are formulated as well.
The document describes the use of two separate blockchain-platforms,which interact with each other within the framework of the Multifactor User Authentication(MFA) system.
Implement multifactor authentication on domain registrar accounts, or on other systems used to modify DNS records.
Examples of successful use of the developed methods of correct solution of multifactor regression problems are presented. Refs.: 9 titles.
Multifactor mathematical modeling and compromise optimization of technological process of electroerosive hole piercing/ Radchenko S. G.
The requirements to stable(robust) experiment plans, stable structures of multifactor statistical models and stability of models coefficients, have been formulated for the first time.
Using multifactor authentication allows you to avoid password compromise, since in addition to the password itself, additional factor parameters are used to log in to the account.
The Japanese tech giant Sony offered the use ofblockchain technology when creating a system of multifactor authentication of users in the performance of certain transactions.
Development of flexible multifactor models with various levels of input information detalization suitable for changing the parameters and application of optimistic and pessimistic scenarios.
Scientific approaches for gene therapy technologies of multifactor diseases have been developed. They are based on the introduction of recombinant genetic material into an organism with the aim of pathologies correction.