Examples of using Network resources in English and their translations into Russian
{-}
-
Official
-
Colloquial
An increase in staff will require greater network resources, increased attention to ad hoc requests
analysis it allows administrator to monitor which applications on the work stations use the network resources.
Implementation of the 802.1 x security architecture over LAN/WAN networks in order to prohibit unauthorized access to network resources.
data, network resources and business operations are exposed to they can undertake more effective actions to reduce the risks.
usage patterns are analysed and network resources reallocated as required and in accordance with operational priorities.
different levels of computing and network resources at different prices.
These network resources collect and unite different people that are willing to share knowledge with others.
This change reduces the number of network resources available by default to anonymous users
work with network resources of remote access
be assigned permissions and therefore do not have access to network resources.
It can also help recruiting network resources, such as the same HeadHunter,
Novell eDirectory™: Gain real-time control over user identities and network resources, and decrease IT administration costs using this award-winning directory service.
DFS shares and other network resources.
Specifies the network access account that can be used by client computers when an advertised program requires access to network resources.
Services that run as the Network Service account access network resources using the credentials of the computer account.
Passive network resources inventory: from telecommunication racks and distribution frames to optical sockets and weldings.
The EOS token is required to leverage shared network resources such as bandwidth, storage, etc.
In addition to enabling Domain Name System(DNS) clients to locate network resources by name, DNS also provides information about network services
filesystem and network resources used by the active processes.
to provide access to all network resources.