Examples of using Systems and applications in English and their translations into Russian
{-}
-
Official
-
Colloquial
you need to create the virtual machines to run the different guest operating systems and applications.
There's evidence that some have obtained the source code for popular operating systems and applications, making it easier to identify as-yet-unknown zero-day vulnerabilities.
applications in the field of microelectronic systems, robototechnics,">biomedical devices, systems and applications with microcontrollers.
operation systems and applications on the basis of pre-installed
without patches for operation systems and applications- virtual patching.
deploy production software systems and applications.
deploying production software systems and applications.
procedures for the Agency's main systems and applications based on the information and communication technology security policy;
Considerable attention is being given to ensuring that computer systems and applications accurately process dates into the next century.
ensure compatibility with other international systems and applications, these documents and data models must be based on international standards and recommendations.
All business critical systems and applications that could have a negative impact on UNRWA operations;
We could say there have been significant changes to these operating systems and applications, but nothing to be seen with the naked eye for users.
Emerging commercial space systems and applications show particular promise in benefits to developing countries.
UNFPA continues to enhance its infrastructure to support systems and applications, and its ability to communicate effectively with field offices and partners $2.1 million.
however"the bulk of the KM literature, and its most accessible part, is about computer systems and applications.
The development of an enterprise data warehouse also provides a key opportunity to incorporate location identifiers into business systems and applications.
security of data, systems and applications.
deactivate users who were no longer authorized to access the systems and applications.
The RIS architecture given in these RIS Guidelines should be applied in transforming policy objectives into the development of services, systems and applications chapter 4.
The development of RIS services as specified in these RIS Guidelines should be applied in transforming policy objectives into the development of services, systems and applications chapter 5.