英語 での Described in this document の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The specification described in this document is not part of the specification of any individual version of HTTP, such as HTTP/1.0 or HTTP/1.1.
For a variety of reasons described in this document, I believe that ICANN's ability to make further progress is blocked by its structural weaknesses.
Most of the really interesting features described in this document are only in 2.0, because a lot of work was done between May and September.
Obviously, the benefits of the features described in this document will not be realized without proper implementation of CSS1 and CSS2.
The systems and techniques described in this document relate generally to providing information to an electronic device in a manner that is likely to be relevant to a user of the electronic device.
Service providers that offer mail services to third-party domains, such as sending of bulk mail, may want to adjust their setup in light of the authorization check described in this document.
If you decide to implement some form of message ordering with Cloud Pub/Sub, see Cloud Datastore and Cloud SQL to learn more about how to implement the strategies described in this document.
The side effect of receiving this in an inbox is determined by the type of the object received, and it is possible to accept types not described in this document(for example, an Offer).
The Data are kept for the time necessary to perform the service requested by you, or required by the objectives described in this document, and the user can always ask the interruption of treatment or deletion of data.
The data are processed for the time necessary to perform the service requested by the user, or required by the purposes described in this document, and the user can always request the interruption of data processing or deletion.
The debug outputs show basically the same EAP authentication frame exchange as the rest of the methods described in this document upon initial authentication to the WLAN(as shown in the captures), along with the addition of some outputs that concern the key caching techniques used by the WLC here.
Intellectual Property The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use other technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights.
Promote the ideas described in this document.
Purpose of shared use: Purposes described in this document.
Any known issues described in this document also apply to the trial versions.
The product described in this document is subject to continuous development and improvements.
The two most-common security methods standardized and implemented for 802.11 WLANs are described in this document.
An overview into the technical details involving our encryption and security methods are described in this document.