Përkthe "aws credentials" në Koreane

Duke shfaqur 50 nga 50 përkthimet e frazës "aws credentials" nga Anglisht në Koreane

Përkthime të aws credentials

"aws credentials" në Anglisht mund të përkthehet në Koreane fjalët/frazat e mëposhtme:

aws aws 클라우드 함께 현재
credentials 데이터 로그인 암호 액세스 인증 자격 증명

Përkthimi i Anglisht në Koreane i aws credentials

Anglisht
Koreane

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN Choose a number from below, or type in your own value 1 / Enter AWS credentials in the next step "false" 2 / Get AWS credentials from the environment (env vars or IAM) "true" env_auth> 1

KO 1 / 다음 단계에서 AWS 자격 증명을 입력하십시오 "그릇된" 2 / 환경에서 AWS 자격 증명 가져 오기 (env vars 또는 iam) "진실" env_auth> 1.

1 / da-eum dangyeeseo AWS jagyeog jeungmyeong-eul iblyeoghasibsio "geuleusdoen" 2 / hwangyeong-eseo AWS jagyeog jeungmyeong gajyeo ogi (env vars ttoneun iam) "jinsil" env_auth> 1.

Anglisht Koreane
aws aws

EN An AWS account is a container for your AWS resources. You create and manage your AWS resources in an AWS account, and the AWS account provides administrative capabilities for access and billing.

KO AWS 계정은 AWS 리소스용 컨테이너입니다. AWS 계정 내에 AWS 리소스를 생성하고 관리할 수 있으며, AWS 계정은 액세스 및 결제에 대한 관리 기능을 제공합니다.

AWS gyejeong-eun AWS lisoseuyong keonteineoibnida. AWS gyejeong naee AWS lisoseuleul saengseonghago gwanlihal su iss-eumyeo, AWS gyejeong-eun aegseseu mich gyeoljee daehan gwanli gineung-eul jegonghabnida.

Anglisht Koreane
aws aws

EN You can configure functions to run on Graviton2 through the AWS Management Console, the AWS Lambda API, the AWS CLI, and AWS CloudFormation by setting the architecture flag to ‘arm64’ for your function.

KO 기능에 대해 아키텍처 플래그를 'arm64'로 설정해 AWS 관리 콘솔, AWS Lambda API, AWS CLI 및 AWS CloudFormation을 통해 Graviton2에서 실행되도록 기능을 구성할 수 있습니다.

gineung-e daehae akitegcheo peullaegeuleul 'arm64'lo seoljeonghae AWS gwanli konsol, AWS Lambda API, AWS CLI mich AWS CloudFormation-eul tonghae Graviton2eseo silhaengdoedolog gineung-eul guseonghal su issseubnida.

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can enable code signing by creating a Code Signing Configuration through the AWS Management Console, the Lambda API, the AWS CLI, AWS CloudFormation, and AWS SAM

KO AWS Management Console, Lambda API, AWS CLI, AWS CloudFormation 및 AWS SAM을 통해 코드 서명 구성을 생성하여 코드 서명을 구현할 수 있습니다

AWS Management Console, Lambda API, AWS CLI, AWS CloudFormation mich AWS SAMeul tonghae kodeu seomyeong guseong-eul saengseonghayeo kodeu seomyeong-eul guhyeonhal su issseubnida

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can do this using the AWS Lambda console, the Lambda API, the AWS CLI, AWS CloudFormation, and AWS SAM.

KO 이 과정을 AWS Lambda console, Lambda API, AWS CLI, AWS CloudFormation 및 AWS SAM을 사용하여 수행할 수 있습니다.

i gwajeong-eul AWS Lambda console, Lambda API, AWS CLI, AWS CloudFormation mich AWS SAMeul sayonghayeo suhaenghal su issseubnida.

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can configure functions to run on Graviton2 through the AWS Management Console, the AWS Lambda API, the AWS CLI, and AWS CloudFormation by setting the architecture flag to ‘arm64’ for your function.

KO 기능에 대해 아키텍처 플래그를 'arm64'로 설정해 AWS 관리 콘솔, AWS Lambda API, AWS CLI 및 AWS CloudFormation을 통해 Graviton2에서 실행되도록 기능을 구성할 수 있습니다.

gineung-e daehae akitegcheo peullaegeuleul 'arm64'lo seoljeonghae AWS gwanli konsol, AWS Lambda API, AWS CLI mich AWS CloudFormation-eul tonghae Graviton2eseo silhaengdoedolog gineung-eul guseonghal su issseubnida.

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can enable code signing by creating a Code Signing Configuration through the AWS Management Console, the Lambda API, the AWS CLI, AWS CloudFormation, and AWS SAM

KO AWS Management Console, Lambda API, AWS CLI, AWS CloudFormation 및 AWS SAM을 통해 코드 서명 구성을 생성하여 코드 서명을 구현할 수 있습니다

AWS Management Console, Lambda API, AWS CLI, AWS CloudFormation mich AWS SAMeul tonghae kodeu seomyeong guseong-eul saengseonghayeo kodeu seomyeong-eul guhyeonhal su issseubnida

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can do this using the AWS Lambda console, the Lambda API, the AWS CLI, AWS CloudFormation, and AWS SAM.

KO 이 과정을 AWS Lambda console, Lambda API, AWS CLI, AWS CloudFormation 및 AWS SAM을 사용하여 수행할 수 있습니다.

i gwajeong-eul AWS Lambda console, Lambda API, AWS CLI, AWS CloudFormation mich AWS SAMeul sayonghayeo suhaenghal su issseubnida.

Anglisht Koreane
aws aws
lambda lambda
api api

EN AWS works with customers to provide the information they need to manage compliance when using the AWS US East/West, AWS GovCloud (US), or AWS Canada (Central) Regions

KO AWS는 고객과 협력하여 고객이 AWS 미국 동부/서부, AWS GovCloud(미국) 또는 AWS 캐나다(중부) 지역을 사용할 때 규정 준수를 관리하는 필요한 정보를 제공합니다

AWSneun gogaeggwa hyeoblyeoghayeo gogaeg-i AWS migug dongbu/seobu, AWS GovCloud(migug) ttoneun AWS kaenada(jungbu) jiyeog-eul sayonghal ttae gyujeong junsuleul gwanlihaneun de pil-yohan jeongboleul jegonghabnida

Anglisht Koreane
aws aws

EN AWS provides workbooks, whitepapers, and best practice guides on our AWS Compliance Resources page and customers have on-demand access to AWS third-party audit reports in AWS Artifact.

KO AWSAWS 규정 준수 리소스 페이지를 통해 워크북, 백서 및 모범 사례 가이드를 제공하며 고객은 요청 시 AWS Artifact에서 AWS 타사 감사 보고서에 액세스할 수 있습니다.

AWSneun AWS gyujeong junsu lisoseu peijileul tonghae wokeubug, baegseo mich mobeom salye gaideuleul jegonghamyeo gogaeg-eun yocheong si AWS Artifacteseo AWS tasa gamsa bogoseoe aegseseuhal su issseubnida.

Anglisht Koreane
aws aws

EN AWS provides workbooks, whitepapers, and best practice guides on our AWS Compliance Resources page and customers have on-demand access to the AWS third-party audit reports in AWS Artifact.

KO AWSAWS 규정 준수 리소스 페이지를 통해 워크북, 백서 및 모범 사례 가이드를 제공하며 고객은 요청 시 AWS 아티팩트에서 AWS 타사 감사 보고서에 액세스할 수 있습니다.

AWSneun AWS gyujeong junsu lisoseu peijileul tonghae wokeubug, baegseo mich mobeom salye gaideuleul jegonghamyeo gogaeg-eun yocheong si AWS atipaegteueseo AWS tasa gamsa bogoseoe aegseseuhal su issseubnida.

Anglisht Koreane
aws aws

EN AWS provides workbooks, whitepapers, and best practice guides on our AWS Compliance Resources page and customers have on-demand access to the AWS third-party audit reports in AWS Artifact

KO AWSAWS 규정 준수 리소스 페이지를 통해 워크북, 백서 및 모범 사례 가이드를 제공하며 고객이 요청할 경우 AWS 아티팩트에서 AWS 타사 감사 보고서에 액세스할 수 있습니다

AWSneun AWS gyujeong junsu lisoseu peijileul tonghae wokeubug, baegseo mich mobeom salye gaideuleul jegonghamyeo gogaeg-i yocheonghal gyeong-u AWS atipaegteueseo AWS tasa gamsa bogoseoe aegseseuhal su issseubnida

Anglisht Koreane
aws aws

EN AWS Organizations is available in all AWS commercial regions, AWS GovCloud (US) regions, and China regions The service endpoints for AWS Organizations are located in US East (N

KO AWS Organizations는 모든 AWS 상용 리전, AWS GovCloud(미국) 및 중국 리전에서 사용할 수 있습니다

AWS Organizationsneun modeun AWS sang-yong lijeon, AWS GovCloud(migug) mich jung-gug lijeon-eseo sayonghal su issseubnida

Anglisht Koreane
aws aws

EN AWS Control Tower, built on AWS services such as AWS Organizations, offers the easiest way to set up and govern a new, secure, multi-account AWS environment

KO AWS Organizations와 같은 AWS 서비스에 구축되는 AWS Control Tower는 새롭고 안전한 다중 계정 AWS 환경을 설정 및 관리할 수 있는 가장 쉬운 방법을 제공합니다

AWS Organizationswa gat-eun AWS seobiseue guchugdoeneun AWS Control Towerneun saelobgo anjeonhan dajung gyejeong AWS hwangyeong-eul seoljeong mich gwanlihal su issneun gajang swiun bangbeob-eul jegonghabnida

Anglisht Koreane
aws aws

EN For a list of AWS services integrated with AWS Organizations, see AWS Services That You Can Use with AWS Organizations.

KO AWS Organizations에 통합된 AWS 서비스 목록은 AWS Organizations와 함께 사용할 수 있는 AWS 서비스를 참조하십시오.

AWS Organizationse tonghabdoen AWS seobiseu moglog-eun AWS Organizationswa hamkke sayonghal su issneun AWS seobiseuleul chamjohasibsio.

Anglisht Koreane
aws aws

EN To see supported AWS Regions, please visit the AWS Region Table for all AWS global infrastructure. For more information, see Regions and Endpoints in the AWS General Reference.

KO 지원되는 AWS 리전을 보려면 모든 AWS 글로벌 인프라에 대한 AWS 리전 표를 참조하세요. 자세한 내용은 AWS 일반 참조에서 리전 및 엔드포인트를 참조하십시오.

jiwondoeneun AWS lijeon-eul bolyeomyeon modeun AWS geullobeol inpeula-e daehan AWS lijeon pyoleul chamjohaseyo. jasehan naeyong-eun AWS ilban chamjo-eseo lijeon mich endeupointeuleul chamjohasibsio.

Anglisht Koreane
aws aws

EN AWS Security Token Service (AWS STS) to enable you to request temporary, limited-privilege credentials for users to authenticate.

KO 사용자 인증을 위해 임시의 제한된 권한 자격 증명을 요청할 수 있도록 하기 위한 AWS Security Token Service(AWS STS)

sayongja injeung-eul wihae imsiui jehandoen gwonhan jagyeog jeungmyeong-eul yocheonghal su issdolog hagi wihan AWS Security Token Service(AWS STS)

Anglisht Koreane
aws aws

EN The establishment of a centralised service to store many millions of payment credentials or create one-time use credentials on demand creates an obvious point of attack

KO 수백만 개의 결제 자격 증명을 저장하거나 요청 시마다 일회성 자격 증명을 생성하는 중앙 집중식 서비스는 명확한 공격 대상입니다

subaegman gaeui gyeolje jagyeog jeungmyeong-eul jeojanghageona yocheong simada ilhoeseong jagyeog jeungmyeong-eul saengseonghaneun jung-ang jibjungsig seobiseuneun myeonghwaghan gong-gyeog daesang-ibnida

EN If you notice that backups are not being saved yet, update your site credentials. Go to Manage > Settings > Jetpack. You should see a form that allows you to add your site credentials.

KO 백업이 아직 저장되지 않은 것으로 보인다면 사이트 자격 증명을 업이트하세요. 관리 > 설정 > Jetpack에 사이트 자격 증명을 추가할 수 있는 양식이 있습니다.

baeg-eob-i ajig jeojangdoeji anh-eun geos-eulo boindamyeon saiteu jagyeog jeungmyeong-eul eobdeiteuhaseyo. gwanli > seoljeong > Jetpacke saiteu jagyeog jeungmyeong-eul chugahal su issneun yangsig-i issseubnida.

EN AWS M5.4xlarge are 27% more expensive for 25% less performance AWS C5n.4xlarge are 43% more expensive for 19% less performance AWS R5.4xlarge are 67% more expensive for 25% less performance (See Note 2)

KO AWS M5.4xlarge는 27% 더 비싸지만 성능은 25% 더 낮음 AWS C5n.4xlarge는 43% 더 비싸지만 성능은 19% 더 낮음 AWS R5.4xlarge는 67% 더 비싸지만 성능은 25% 더 낮음 (참고 2 참조)

AWS M5.4xlargeneun 27% deo bissajiman seongneung-eun 25% deo naj-eum AWS C5n.4xlargeneun 43% deo bissajiman seongneung-eun 19% deo naj-eum AWS R5.4xlargeneun 67% deo bissajiman seongneung-eun 25% deo naj-eum (chamgo 2 chamjo)

Anglisht Koreane
aws aws

EN For more information on AWS CloudTrail logs and auditing API calls across AWS services, see AWS CloudTrail.

KO AWS 서비스 전반에 걸친 AWS CloudTrail 로그 및 API 호출 감사에 대한 자세한 내용은 AWS CloudTrail을 참조하세요.

AWS seobiseu jeonban-e geolchin AWS CloudTrail logeu mich API hochul gamsa-e daehan jasehan naeyong-eun AWS CloudTrail-eul chamjohaseyo.

Anglisht Koreane
aws aws
api api

EN You can configure concurrency on your function through the AWS Management Console, the Lambda API, the AWS CLI, and AWS CloudFormation

KO AWS Management Console, Lambda API, AWS CLI 및 AWS CloudFormation을 통해 기능에서 동시성을 구성할 수 있습니다

AWS Management Console, Lambda API, AWS CLI mich AWS CloudFormation-eul tonghae gineung-eseo dongsiseong-eul guseonghal su issseubnida

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can create digitally signed code artifacts using a Signing Profile through the AWS Signer console, the Signer API, SAM CLI or AWS CLI. To learn more, please see the documentation for AWS Signer.

KO AWS Signer 콘솔, Signer API, SAM CLI 또는 AWS CLI를 통해 서명 프로파일을 사용하여 디지털 서명한 코드 아티팩트를 생성할 수 있습니다. 자세한 내용을 알아보려면 AWS Signer 문서를 참조하세요.

AWS Signer konsol, Signer API, SAM CLI ttoneun AWS CLIleul tonghae seomyeong peulopail-eul sayonghayeo dijiteol seomyeonghan kodeu atipaegteuleul saengseonghal su issseubnida. jasehan naeyong-eul al-abolyeomyeon AWS Signer munseoleul chamjohaseyo.

Anglisht Koreane
aws aws
api api

EN AWS Lambda functions powered by AWS Graviton2 processors are 20% cheaper compared to x86-based Lambda functions. The Lambda free tier applies to AWS Lambda functions powered by x86 and Arm-based architectures.

KO AWS Graviton2 프로세서로 구동되는 AWS Lambda 함수는 x86 기반 Lambda 함수에 비해 20% 저렴합니다. Lambda 프리 티어는 x86 및 Arm 기반 아키텍처로 구동되는 AWS Lambda 함수에 적용됩니다.

AWS Graviton2 peuloseseolo gudongdoeneun AWS Lambda hamsuneun x86 giban Lambda hamsue bihae 20% jeolyeomhabnida. Lambda peuli tieoneun x86 mich Arm giban akitegcheolo gudongdoeneun AWS Lambda hamsue jeog-yongdoebnida.

Anglisht Koreane
aws aws
lambda lambda

EN AWS Outposts is a fully managed service that offers the same AWS infrastructure, AWS services, APIs, and tools to virtually any datacenter, co-location space, or on-premises facility for a truly consistent hybrid experience

KO AWS Outposts는 일관된 하이브리드 환경을 위해 동일한 AWS 인프라, AWS 서비스, API 및 도구를 모든 이터 센터, 코로케이션 공간, 온프레미스 시설에 제공하는 완전관리형 서비스입니다

AWS Outpostsneun ilgwandoen haibeulideu hwangyeong-eul wihae dong-ilhan AWS inpeula, AWS seobiseu, API mich doguleul modeun deiteo senteo, kolokeisyeon gong-gan, onpeulemiseu siseol-e jegonghaneun wanjeongwanlihyeong seobiseu-ibnida

Anglisht Koreane
aws aws
apis api

EN You can enforce and monitor backup requirements with AWS Backup, or centrally define your recommended configuration criteria across resources, AWS Regions, and accounts with AWS Config

KO AWS Backup을 통해 백업 요구 사항을 적용 및 모니터링하거나 AWS Config를 통해 여러 리소스, AWS 리전 및 계정에서 권장되는 구성 기준을 중앙 집중식으로 정의할 수 있습니다

AWS Backup-eul tonghae baeg-eob yogu sahang-eul jeog-yong mich moniteolinghageona AWS Configleul tonghae yeoleo lisoseu, AWS lijeon mich gyejeong-eseo gwonjangdoeneun guseong gijun-eul jung-ang jibjungsig-eulo jeong-uihal su issseubnida

Anglisht Koreane
aws aws

EN I'm using the AWS Free Tier to test AWS services. How do I make sure that all the resources I'm using are covered under the AWS Free Tier?

KO AWS 서비스를 테스트하는 데 AWS 프리 티어를 사용하고 있습니다. 사용하는 모든 리소스가 AWS 프리 티어에서 부합하는지 어떻게 알 수 있습니까?

AWS seobiseuleul teseuteuhaneun de AWS peuli tieoleul sayonghago issseubnida. sayonghaneun modeun lisoseuga AWS peuli tieoeseo buhabhaneunji eotteohge al su issseubnikka?

Anglisht Koreane
aws aws

EN Note: Most benefits offered by the AWS Free Tier apply globally to all resources on your account, not individually to each AWS Region. Be sure to monitor your usage in all AWS Regions.

KO 참고: AWS 프리 티어에서 제공하는 혜택은 대부분 계정의 모든 리소스에 각 AWS 리전이 아닌 전역적으로 적용됩니다. 모든 AWS 리전의 사용을 모니터링하십시오.

chamgo: AWS peuli tieoeseo jegonghaneun hyetaeg-eun daebubun gyejeong-ui modeun lisoseue gag AWS lijeon-i anin jeon-yeogjeog-eulo jeog-yongdoebnida. modeun AWS lijeon-ui sayong-eul moniteolinghasibsio.

Anglisht Koreane
aws aws

EN This feature is available through the AWS Management Console, the AWS SDKs, and the AWS Command Line Interface (CLI)

KO 이 기능은 AWS 관리 콘솔, AWS SDK 및 AWS 명령줄 인터페이스(CLI)를 통해 사용할 수 있습니다

i gineung-eun AWS gwanli konsol, AWS SDK mich AWS myeonglyeongjul inteopeiseu(CLI)leul tonghae sayonghal su issseubnida

Anglisht Koreane
aws aws
sdks sdk

EN As an Advanced Technology partner, Teradata built a strong AWS-based business and continues to differentiate and stand out to AWS customers with a robust go-to-market AWS strategy.

KO 첨단 기술 파트너인 테라이타는 강력한 AWS 기반 비즈니스를 구축하고 강력한 시장 출시 AWS 전략을 통해 AWS 고객에게 지속적으로 차별화되고 우수한 서비스를 제공합니다.

cheomdan gisul pateuneoin teladeitaneun ganglyeoghan AWS giban bijeuniseuleul guchughago ganglyeoghan sijang chulsi AWS jeonlyag-eul tonghae AWS gogaeg-ege jisogjeog-eulo chabyeolhwadoego usuhan seobiseuleul jegonghabnida.

Anglisht Koreane
aws aws

EN This means we’re tested and validated to support protecting your workloads in AWS Outposts and migrating data between AWS Regions and AWS Outposts.

KO 즉, AWS Outposts에서 워크로드를 보호하고 AWS Regions 및 AWS Outposts 간 이터 마이그레이션 지원에 대한 테스트 실시 및 유효성을 검증받았습니다

jeug, AWS Outpostseseo wokeulodeuleul bohohago AWS Regions mich AWS Outposts gan deiteo maigeuleisyeon jiwon-e daehan teseuteu silsi mich yuhyoseong-eul geomjeungbad-assseubnida

Anglisht Koreane
aws aws

EN Each episode includes AWS news, tech tips, and interviews with startups, AWS partners, and AWS employees.

KO 각각의 에피소드에서는 AWS 뉴스, 기술 팁, 스타트업 인터뷰, AWS 파트너, AWS 직원들을 비롯하여 다양한 내용을 다룹니다.

gaggag-ui episodeueseoneun AWS nyuseu, gisul tib, seutateueob inteobyu, AWS pateuneo, AWS jig-wondeul-eul biloshayeo dayanghan naeyong-eul dalubnida.

Anglisht Koreane
aws aws

EN “I have the fun job of having all of AWS to play with and building .NET SDK and Tools for AWS. With 10 years done I'm still excited for the future of .NET and AWS.”

KO “저는 모든 AWS로 .NET SDK 및 AWS용 도구를 활용하며 구축하는 일을 즐기고 있습니다. 10년을 해왔지만 아직도 .NET 및 AWS의 미래를 기대하고 있습니다.”

“jeoneun modeun AWSlo .NET SDK mich AWSyong doguleul hwal-yonghamyeo guchughaneun il-eul jeulgigo issseubnida. 10nyeon-eul haewassjiman ajigdo .NET mich AWSui milaeleul gidaehago issseubnida.”

EN For more information on AWS CloudTrail logs and auditing API calls across AWS services, see AWS CloudTrail.

KO AWS 서비스 전반에 걸친 AWS CloudTrail 로그 및 API 호출 감사에 대한 자세한 내용은 AWS CloudTrail을 참조하세요.

AWS seobiseu jeonban-e geolchin AWS CloudTrail logeu mich API hochul gamsa-e daehan jasehan naeyong-eun AWS CloudTrail-eul chamjohaseyo.

Anglisht Koreane
aws aws
api api

EN You can configure concurrency on your function through the AWS Management Console, the Lambda API, the AWS CLI, and AWS CloudFormation

KO AWS Management Console, Lambda API, AWS CLI 및 AWS CloudFormation을 통해 기능에서 동시성을 구성할 수 있습니다

AWS Management Console, Lambda API, AWS CLI mich AWS CloudFormation-eul tonghae gineung-eseo dongsiseong-eul guseonghal su issseubnida

Anglisht Koreane
aws aws
lambda lambda
api api

EN You can create digitally signed code artifacts using a Signing Profile through the AWS Signer console, the Signer API, SAM CLI or AWS CLI. To learn more, please see the documentation for AWS Signer.

KO AWS Signer 콘솔, Signer API, SAM CLI 또는 AWS CLI를 통해 서명 프로파일을 사용하여 디지털 서명한 코드 아티팩트를 생성할 수 있습니다. 자세한 내용을 알아보려면 AWS Signer 문서를 참조하세요.

AWS Signer konsol, Signer API, SAM CLI ttoneun AWS CLIleul tonghae seomyeong peulopail-eul sayonghayeo dijiteol seomyeonghan kodeu atipaegteuleul saengseonghal su issseubnida. jasehan naeyong-eul al-abolyeomyeon AWS Signer munseoleul chamjohaseyo.

Anglisht Koreane
aws aws
api api

EN AWS Lambda functions powered by AWS Graviton2 processors are 20% cheaper compared to x86-based Lambda functions. The Lambda free tier applies to AWS Lambda functions powered by x86 and Arm-based architectures.

KO AWS Graviton2 프로세서로 구동되는 AWS Lambda 함수는 x86 기반 Lambda 함수에 비해 20% 저렴합니다. Lambda 프리 티어는 x86 및 Arm 기반 아키텍처로 구동되는 AWS Lambda 함수에 적용됩니다.

AWS Graviton2 peuloseseolo gudongdoeneun AWS Lambda hamsuneun x86 giban Lambda hamsue bihae 20% jeolyeomhabnida. Lambda peuli tieoneun x86 mich Arm giban akitegcheolo gudongdoeneun AWS Lambda hamsue jeog-yongdoebnida.

Anglisht Koreane
aws aws
lambda lambda

EN Customers are provided AWS services and tools to enable their agencies and trusted partners to retain complete control and ownership over their own criminal justice data, such as AWS Key Management Service (KMS) and AWS Nitro System.

KO 고객은 AWS Key Management Service(KMS) 및 AWS Nitro 시스템과 같은 AWS 서비스 및 도구를 통해 해당 기관과 신뢰하는 파트너가 형사 사법 이터에 대한 완전한 소유권을 유지하도록 지원할 수 있습니다.

gogaeg-eun AWS Key Management Service(KMS) mich AWS Nitro siseutemgwa gat-eun AWS seobiseu mich doguleul tonghae haedang gigwangwa sinloehaneun pateuneoga hyeongsa sabeob deiteoe daehan wanjeonhan soyugwon-eul yujihadolog jiwonhal su issseubnida.

Anglisht Koreane
aws aws

EN Military organizations or contractors conducting business with the DoD can request access to AWS security documentation by contacting your AWS Account Manager or submitting the AWS Compliance Contact Us Form

KO 국방부와 거래하는 군대 조직 또는 계약업체는 AWS 계정 관리자에게 문의하거나 AWS 규정 준수 문의 양식을 제출하여 AWS 보안 문서에 대한 액세스를 요청할 수 있습니다

gugbangbuwa geolaehaneun gundae jojig ttoneun gyeyag-eobcheneun AWS gyejeong gwanlija-ege mun-uihageona AWS gyujeong junsu mun-ui yangsig-eul jechulhayeo AWS boan munseoe daehan aegseseuleul yocheonghal su issseubnida

Anglisht Koreane
aws aws

EN Non-government customers, such as AWS partners, can download the AWS Partner FedRAMP Security Package using AWS Artifact.

KO AWS 파트너와 같은 비정부 고객은 AWS Artifact를 사용하여 AWS 파트너 FedRAMP 보안 패키지를 다운로드할 수 있습니다.

AWS pateuneowa gat-eun bijeongbu gogaeg-eun AWS Artifactleul sayonghayeo AWS pateuneo FedRAMP boan paekijileul daunlodeuhal su issseubnida.

Anglisht Koreane
aws aws
fedramp fedramp

Po shfaq 50 nga 50 përkthime