And chroot doesn't change the network access.
而且chroot不会改变网络访问。
Details on configuring the network access server.
关于配置网络访问服务器的细节。
So you pay for three things in network access: bandwidth, latency, and jitter.
所以网络接入中你在为三件事买单:带宽、延迟和抖动。
Now you can configure the network access of the VIO Server using the ent3 adapter.
现在,您可以使用ent3适配器来配置VIO服务器的网络访问。
This link represents the network access that the server provides to the virtual system.
该链接代表了服务器提供给虚拟机系统的网络访问。
Network access was through a single 1 GBit Ethernet adapter running in full-duplex mode.
网络访问通过一个单独的以全双工模式运行的1GBit以太网适配器。
There are also network access controls for sockets, network interfaces, hosts, and ports.
还有用于套接字、网络接口、主机和端口的网络访问控制。
Network access was through a single, 1 GBit Ethernet adapter running in full-duplex mode.
网络访问是通过在双工模式下运行的一个1GBitEthernet适配器。
Network access occurred through a single 1 GB Ethernet adapter running in full-duplex mode.
通过一个1GB以太网适配器进行网络访问,采用全双工模式。
The only way to regain network access before the allotted time has passed is to reboot the computer.
在设定时间前,恢复网络的唯一办法只有重启电脑。
The network access will require some form of HTTP communication in order to contact the Twitter servers.
网络访问需要一些形式的HTTP通信,以便联系t witter服务器。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
If the database goes down or if there are wide-area network access issues across the globe, the application is down.
如果数据库损坏或者全局出现大范围的网络访问问题,那么应用程序将宕机。
The following command causes a user logging in from a network access server to have immediate access to EXEC commands.
下面的命令可以使一个用户从网络访问服务器登录,并获得对EXEC命令的立即访问。
For new employees, an average of 73 percent was given security awareness training prior to being granted network access.
对于新员工,有73%的机构在其被授予网络访问前进行安全意识培训。
For example, it's hard to use correctly, root users can still escape from it, and it doesn't control network access at all.
例如,它难以正确使用,root用户还是可以从中脱离,而且它根本不去控制网络访问。
Connectivity (network access) information is stored in the system database directory, local database directory and node directory.
连接(网络访问)信息存储在System数据库目录、本地数据库目录和节点目录中。
And since each node should be configured with a host name that corresponds to the node name, network access is simplified, as well.
由于每个节点都应该配置一个与节点名对应的主机名,因此也简化了网络访问。
Different installation media directory structures are supported (Table 1) for each Linux distribution and each network access protocol.
每个Linux发行版和每种网络访问协议支持不同的安装介质目录结构(表1)。
It supports cross domain network access (enabling Silverlight clients to directly access resources and data from resources on the web).
它支持跨域网络访问(能让Silverlight客户端直接访问外部的资源和数据)。
Ensure that systems in the IBM Cloud VLAN have network access to the computers in your network that you want the IBM Cloud systems to use.
确保IBMCloudVLAN中的系统拥有到您的网络中ibm Cloud系统要使用的计算机的网络访问能力。
Disadvantage Can't support special needs such as no network access to ClearQuest test manager or only part of resources needed to migrate.
劣势不能支持特殊的需求,例如不能网络连接到ClearQuest测试管理器上,或者需要迁移的部分资源上。
Thus, if one of the VIO Servers were down, the client LPARs would still have network access and a rootvg volume through your second VIO Server.
因此,如果其中一个VIOServer关闭了,则通过您的第二个 VIO Server,客户机LPAR将仍然拥有网络访问和一个rootvg卷。
The carrier, in fact, is thinking of advising users to turn off the 4g network access when they don't think they need it, to save battery life.
实际上,运营商正在考虑建议用户在认为他们不需要4G网络时将其关闭,以节省电量。
Specifically, if everything is happening in the UI thread, performing long operations such as network access or database queries will block the whole UI.
如果UI线程需要处理每一件事情,那些耗时很长的操作——诸如访问网络或查询数据库等——将会阻塞整个UI(线程)。
The essential characteristics for Cloud Computing are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service.
云计算的关键特征是按需获取自助式服务、广阔的互联网访问、资源池、快速伸缩和可度量的服务。
First, clearly Scitter is going to have some kind of dependency on network access - and by extension, the Twitter servers - which will make it awkward to test.
首先,Scitter显然会对网络访问有一些依赖—并且可扩展到Twitter服务器—这会使测试变得非常困难。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
应用推荐