Exemples d'utilisation de Standard protocols en Anglais et leurs traductions en Français
{-}
-
Official
-
Colloquial
He continues:"Domino is actively collaborating with organisations to develop industry communication standard protocols for coding and marking.
To date, there are no standard protocols that achieve consensus on these two points.
Blue2 is preprogrammed with three modes of operation to accommodate the standard protocols used for switch access to apps.
Boston ARTCC bypassed standard protocols and directly contacted the North American Aerospace Defense Command(NORAD)
It uses a proprietary protocol named Virtual Places, but also offers support for standard protocols, including Session Initiation Protocol(SIP),
United States Geological Survey, the study group agreed on a series of standard protocols to monitor marsh birds.
OTT is a set of different technologies that make use of the Internet and its standard protocols to provide the users with multimedia contents,
early warning functions and on the use of common nomenclature, standard protocols and reporting practices;
Our integration services use standard protocols(REST, AMQP)
The Working Group also noted that standard protocols are yet to be developed for the collection
These schemes would require the follow-up of standard protocols that might be simple enough,
There is also a need to establish standard protocols for modelling, water sampling
Standard protocols for the assessment of the therapeutic efficacy of antimalarial drugs have been developed to facilitate the development
ERP(Enterprise Resource Planning) via industry communication standard protocols.
In the Automotive sector, standard protocols like EuroNCAP, JapanNCAP
through the unification of standard protocols in following up maternal and children health;
including any available standard protocols, laboratory tests
technology on successive missions, to the development of standard protocols agreed upon by space agencies of many countries.
Content centric networking and standard protocols such as RPL, User Datagram Protocol(UDP), Transmission Control Protocol(TCP), and CoAP.
These are often intrinsically even more vulnerable because they have not been subject to much public criticism and analysis unlike standard protocols which have been reviewed by work groups and even the public.