Examples of using On your machine in English and their translations into Chinese
{-}
- 
                        Political
                    
- 
                        Ecclesiastic
                    
- 
                        Programming
                    
After setting up your  environment and indexing the test data, you can clone the repo and run any of the examples on your machine.
These are small text files that are placed on your machine to help the site provide a better experience for users.
Electrum encrypts your  private keys locally, supports cold storage, and provides multi-signature capabilities with minimal resource usage on your machine.
Using the table and graph below, you can easily find the ideal temperature on your machine.
The latest Java version contains important enhancements to improve security, performance and stability of the Java applications that run on your machine.
Since‘Napa' is web based, you don't need to install anything on your machine to start developing for Office and SharePoint.”.
ManicTime is not a cloud based service, instead it uses a local datastore, so all recorded data will be kept on your machine.
Offline work- ManicTime is not a cloud-based service, instead, it uses a local datastore, so all recorded data will be kept on your machine.
If BitLocker is enabled on your machine, you may have to go through BitLocker recovery after Secure Boot has been disabled.
It takes two simple steps to install it on your machine(there are other methods as well but I found this the most convenient).
There are cookies set on your machine by external websites whose services are used on  this site.
You can simply install one on your machine and configure it to be used with any service that offers SIP-compatibility.
Once you installed Java on your machine, you would need to set environment variables to point to correct installation directories.
This way you can check if certain services on your machine are still running.
Manufacturers develop drivers so that the OS running on your machine can work harmoniously with your  devices and applications.
This list contains the notebooks that are cached on your machine i.e. those you opened previously on your  computer using OneNote.
This chapter assumes that mysql is installed on your machine and that a MySQL server is available to which you can connect.
Once an attacker can run code on your machine, and maybe even has remote SSH access, the damage could be significant.
This chapter assumes that mysql is installed on your machine and that a MySQL server is available to which you can connect.
But, that creates a situation where the environment on your machine has to be just so in order for your  app to run as expected;