Search: "resources"
[Vulnerability notice] Memcached UDP port reflection attack vulnerability - Security Advisories Documentation
vulnerability may be exploited by hackers when the Memcached service is running, causing consumption of bandwidth or CPU resources in the ...
Scenarios - Cloud Enterprise Network Documentation
usage scenarios of Cloud Enterprise Network (CEN). You can use CEN to connect network resources across the ...
Import key materials - Key Management Service Documentation
Customer master keys (CMKs) are basic resources of KMS. CMKs are composed of key IDs, basic metadata (such as ...
ProduceEditingProjectVideo - ApsaraVideo for VOD Documentation
string. Note: Video resources used in the timeline of an online editing project can be materials from media assets or videos in ...
Alibaba Cloud video encryption - ApsaraVideo for VOD Documentation
level of security, allowing you to protect your video resources in a convenient, efficient, and secure way. Solution ...
Scenarios - Dedicated Host Documentation
strict regulatory compliance, because you can have the full control over the resources of the physical servers, which enables ...
CNAME - Object Storage Service Documentation
seamlessly migrate data storage to the OSS. For example, your domain name is my-domain.com, and all your previous image resources ...
Account group - Data Management Service (DMS Documentation
Log on to Database on the resources page or RDS quick login page to log on to the database using the account group. Manual entry ...
Test environment - Table Store Documentation
resources you actually use per hour. Table Store supports extremely high read/write concurrency. A large-scale performance test may ...
Test result (high-performance instance) - Table Store Documentation
operations is insignificant as the stress increases, the resources in this shard are relatively adequate. As the stress increases, the ...