Examples of using Network-based in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
Access approximate location(network-based) only in the foreground.
As we discussed last quarter, we have significantly expanded our network-based analysis.
Spytech NetVizor is a network-based and disguised employee monitoring software with ability to control the entire network from one central location!
Another example of network-based logging is SurfControl's amusingly-named LittleBrother(oddly, there doesn't yet
increasing the potential for network-based competition.
Axis was at the forefront of network-based video security and we really liked their products, so we became partners.".
Intrusion prevention systems can be classified into four different types: Network-based intrusion prevention system(NIPS):
Location Approximate location(network-based): This is to set up Bluetooth communication.
We would also like to see carriers adopt network-based mobile malware scanning,
Allows network-based installation of Windows operating systems,
Network-based filtering This type of filter is implemented at the transport layer as a transparent proxy,
Location(GPS and network-based): your location is required to calculate accurate prayer times,
The SCENES project developed a transport forecasting model, network-based and with a detailed description of the TEN-T.
However, as iSCSI is a fully network-based protocol, iSCSI initiator support needs more than just the ability to send SCSI packets over the network.
virtual environments or network-based elements.
As Assure Message Scan is network-based, updates happen automatically,
For individual solutions the device can still be accessed network-based via TCP/IP and UDP or web-based via HTTPS.
To facilitate advanced network-based applications through test-beds needed to test,
For CD-ROM/DVD-ROM/Blu-ray disc based installations, although this is less frequent, since network-based installation methods are more and more common.
Discover, track, contain, and block the progression of network-based advanced malware,