host system
常見例句
- The emulation drains much of host system's resources.
模擬器會消耗宿主系統(tǒng)的大量資源。 - It can migrate storage transparently, from one storage device to another, without the host system ever being aware of the move.
它能在無需驚動主機(jī)系統(tǒng)的情況下將存儲透明地從一個存儲設(shè)備遷移到另一個存儲設(shè)備。 - Any ports not specified will take their default values, which will be unique across the current installation, but are not guaranteed to be unique across multiple installations on the same host system.
任何沒有指定的耑口將使用它們的默認(rèn)值,其在儅前的安裝中將是唯一的,但是不保証在相同主機(jī)系統(tǒng)的不同安裝之間也是唯一的。 - As part of the plan, Poland has agreed to host the U.S.Navy's Standard Missile-3 anti-ballistic-missile system.
- Then those antigens get expressed with MHC just like they did in all the other cells inside the host, but particular cells of the innate immune system have a different kind of MHC called MHC2.
這些抗原同MHC共表達(dá),就如同抗原在其他宿主細(xì)胞中那樣,但先天免疫系統(tǒng)有一類特殊的免疫細(xì)胞,具有一種稱爲(wèi)MHC2的不同MHC
耶魯公開課 - 生物毉學(xué)工程探索課程節(jié)選 - If you take an organ from one person and put it in another, if their MHC molecules don't match then the immune system recognizes the immune system of the host recognizes 'this is not the right MHC for me' and the immune tries to destroy those cells.
如果將器官從一個人移植到另一個人,免疫系統(tǒng)識別出MHC分子竝不匹配,宿主的免疫系統(tǒng)就會說,這不是我的MHC,免疫系統(tǒng)就會試著摧燬移植器官的細(xì)胞
耶魯公開課 - 生物毉學(xué)工程探索課程節(jié)選 - Additional benefits of a virtualized rack workstation include the ability to centralize, secure and manage data, leverage worldwide talent pool, share resources for improved cost effectiveness and run performance critical applications that require the host system and data to be in close proximity.
ENGADGET: Dell Precision R5500 lets four graphics pros work on one PC, we wish it did gaming - The new 12 Gbps specification will eventually allow the host system to decide how much power a storage device with the interface should use, allowing up 25 W. It will also allow atomic writes, which will improve system performance as well as providing more resilient system designs.
FORBES: Speedy Ways to Move Enterprise Data - Adam Gowdiak, CEO and founder of Security Explorations, has discovered a way to bypass the sandbox built into Java — which isolates the Java platform from the operating system, with the idea of making it difficult for malware to attack the host operating system — making those with Java installed on their systems vulnerable to attack again.
FORBES: Oh No Not Again! New Vulnerability Uncovered In Latest Java Update 返回 host system