From professional translators, enterprises, web pages and freely available translation repositories.
information on hash algorithms
informatie over hash algoritmes
Last Update: 2013-06-02
Usage Frequency: 1
Quality:
however , two algorithms shall not run simultaneously .
however , two algorithms shall not run simultaneously .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
different optimisation mechanisms ( algorithms ) are used .
different optimisation mechanisms ( algorithms ) are used .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
during daytime processing the algorithms shall run sequentially .
during daytime processing the algorithms shall run sequentially .
Last Update: 2011-10-23
Usage Frequency: 2
Quality:
three algorithms ( 1 to 3 ) shall be applied to offset payment flows .
three algorithms ( 1 to 3 ) shall be applied to offset payment flows .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
( 6 ) the algorithms shall run flexibly by setting a pre-defined time lag between the application of different algorithms to ensure a minimum interval between the running of two algorithms .
( 6 ) the algorithms shall run flexibly by setting a pre-defined time lag between the application of different algorithms to ensure a minimum interval between the running of two algorithms .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
payment orders entered into the entry disposition after the start of any of algorithms 1 to 4 may nevertheless be settled immediately in the entry disposition if the positions and limits of the target2 participants » pm accounts concerned are compatible with both the settlement of these payment orders and the settlement of payment orders in the current optimisation procedure .
payment orders entered into the entry disposition after the start of any of algorithms 1 to 4 may nevertheless be settled immediately in the entry disposition if the positions and limits of the target2 participants » pm accounts concerned are compatible with both the settlement of these payment orders and the settlement of payment orders in the current optimisation procedure .
Last Update: 2011-10-23
Usage Frequency: 2
Quality:
important: please remember the algorithms that you select in this step. you will have to select the same algorithms for the decoy system. otherwise, the hidden system will be inaccessible! (the decoy system must be encrypted with the same encryption algorithm as the hidden system.)note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
belangrijk: onthoud de in deze stap gekozen algoritmes!! u dient dezelfde algoritmes te selecteren bij aanmaak van het lokaas systeem. anders zal het verborgen systeem niet toegankelijk zijn. (het lokaas systeem moet worden gecodeerd met dezelfde algoritmes als het verborgen systeem.)noot: de reden hiervoor is dat beide systemen dezelfde boot lader gebruiken. een boot lader ondersteunt slechts één algoritmen. (voor ieder algoritme is er een eigen versie van de bootlader.)
Last Update: 2013-06-02
Usage Frequency: 1
Quality: