Examples of using Computing environments in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Firewalls, cloud computing environments, antivirus, and antimalware software are all great resources to give you business the kind of security staples it needs to withstand attacks.
In cloud computing environments it is important to keep under control the allocation of virtual machines in physical servers.
data to be processed, some swfms are using techniques of parallelism in high performance computing environments to produce theirs results.
We will support the needs of our users for operation in many different kinds of computing environments.
Lenovo provides complete infrastructure solutions to help companies build and manage their computing environments.
support and operation of computing environments, security and disaster recovery for information assets,
this complicates the administration of computing environments, because is necessary to keep the systems running in compatibility with quite different devices simultaneously.
private/hybrid cloud, and end-user computing environments.
distance learning are stored in computing environments used in the teaching-learning process,
particularly in connection with virus infections of users' computing environments, is excluded.
which usually serve a single purpose as opposed to being general computing environments.
Being responsible for the development of high performance computing environments for which developed medical applications may be made available to communities related to research
with ef- ficient scalability through the use of network functions virtualization(nfv) in low cost computing environments.
Most computing environments before the 1990s were non-networked,
Imaginative use of both computing power and new computing environments drives much current research- so an interest in computation and/or computer science can also be a start for a statistician.
Set policies that dynamically adapt to users' computing environments, with network security services that map to the user based on role,
huge range of dimensions, unique in its support for today's technical computing environments and workflows.
huge range of dimensions, unique in its support for today's technical computing environments and workflows.
Applications for mobile computing environments usually have several accessibility limitations due to the dependency on the interaction with the user through the device display, which hinders its use to
technologic resources, computing environments and telematic systems have contributed significantly to the development,