important component – Japanese Translation – Keybot Dictionary
TTN Translation Network
TTN
TTN
Login
Deutsch
Français
Source Languages
Target Languages
Select
Select
Keybot
49
Results
38
Domains
ourworld.unu.edu
Show text
Show cached source
Open source URL
“In recent years we’ve seen increasing interest in agroforestry as an
important component
of sustainable land use and development,” says Douglas McGuire, team leader on the FAO’s Forest Resources Management team.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
ourworld.unu.edu
as primary domain
こうした新たな理解は、FAOと 国際アグロフォレストリー研究センター(ICRAF) の活動によるところが大きい。ICRAFは、木の特定品種の利用に関する問題や、それらの品種がどのように土壌の質を改善し、特定の作物を補完し、小規模自作農家の新たな収入源を生むのかといった問題の調査を行っている。
www.phrc.pl
Show text
Show cached source
Open source URL
Increasingly, the experts agree that propulsion system electrification is not the only approach for achieving CO2-neutral mobility, but it is an
important component
of the solution. To discuss boundary conditions and possible...
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
fev.com
as primary domain
Software, combined with FEV hardware/software integration, creates strongest security for end-to-end communications
2 Hits
www.invista.com
Show text
Show cached source
Open source URL
“Being a good steward of the environment is an
important component
to how INVISTA operates its facilities,” said Brenda Kennell, INVISTA’s environmental specialist and site coordinator. “INVISTA continues to host the South River Cleanup as a way to help improve the health and vitality of our South River, and ultimately the Potomac River and Chesapeake Bay.”
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
invista.com
as primary domain
Volunteers should arrive at the south parking lot of the YMCA, located at 648 S. Wayne Avenue, at 9 a.m. on Saturday, April 5. Volunteers are asked to bring workgloves, water and bug spray, and wear long pants and water-resistant boots. INVISTA will provide trash bags and necessary equipment for disposal of waste.
www.gnu.org
Show text
Show cached source
Open source URL
giving any credit to Linus Torvalds. He did write an
important component
of the system. We want to get credit for launching and sustaining the system's development, but this doesn't mean we should treat Linus the same way those who call the system “Linux” treat us.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
gnu.org
as primary domain
リーナス・トーバルズへの謝意を示すことを止めることを人々に要求するのは非紳士的でしょう。かれはシステムの重要なコンポーネントを書きました。わたしたちはシステムの開発を開始して継続させてきたことに対して謝意を示してもらいたいと考えます。しかし、システムを“Linux”と呼ぶ人々がわたしたちに対するのと同じようにわたしたちがリーナスを扱うべきであることを意味しません。わたしたちはかれの政治的見解に強く反対しますが、見解の相違を立派にかつ、公然と扱います。システムに対するかれの貢献の謝辞から外すようにするのではなく。
basko.com
Show text
Show cached source
Open source URL
Customers achieve performance and security for critical workloads in over 40,000 deployments with KEMP. With mobile continuing to outpace other forms of personal computing, HTTP/2 will become an even more
important component
for modern workloads.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
kemptechnologies.com
as primary domain
HTTP/2 Support is standard for every KEMP customer, enabling organizations to experience the best web performance available. For KEMP customers switching on HTTP/2 support the impact will be measured in seconds per page load rather than milliseconds, a massive leap compared to internet performance improvements which have come before this.
www.maximintegrated.com
Show text
Show cached source
Open source URL
Given their goals of security enhancement and enforcement, Miller and Valasek are happy to share details of their Jeep hack. They found the head unit to be the most
important component
because it processes most of the outside data.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
maximintegrated.com
as primary domain
セキュリティの強化と実施を目的とするMiller博士とValasek氏は、彼らがJeepで行ったハッキングの詳細について語ってくれました。彼らは、外部データの大部分を処理するヘッドユニットが、最も重要なコンポーネントだと考えました。2人はヘッドユニットについてさらに深く調べ、外部データの処理方法に含まれる脆弱性を特定しました。驚くのはここからで、彼らはシステムを悪用するコード(エクスプロイト)を書くのに数か月かかると思っていました。ところが、数週間の調査の後、わずか5分ほどで完成したのです。「リモートからこのヘッドユニット上でコードを動作させるのは、非常に容易でした」とMiller博士は語っています。