Active networking

Results: 91



#Item
61Instinet / Alternative Trading Systems / Direct Edge / Financial markets / Stock market / Computer networking

Alternative Trading Systems Active Filers as of January 30, 2009 ATS Name Date of Initial Filing

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2009-02-04 16:52:41
62Software / Identity management / Computer networking / Windows / User / Group Policy / Organizational Unit / User interface / Microsoft Dynamics GP / Computing / System software / Active Directory

Effective Ways to Manage User Life Cycle in Active Directory What’s this whitepaper about? Although Active Directory is a powerful and popular directory service, there are significant gaps between its user management

Add to Reading List

Source URL: www.manageengine.com

Language: English - Date: 2014-05-07 12:03:29
63Ethics / Structure / Demographics / Marketing / Tween / Social networking service / Internet privacy / Parenting / Identity theft / Human development / Youth / Childhood

Embrace Civility in the Digital Age ~ Issue Brief Cyber Savvy Parents The Good News! Active and Positive Parenting

Add to Reading List

Source URL: www.embracecivility.org

Language: English - Date: 2014-04-01 14:21:59
64Traceroute / Internet standards / Internet protocols / Computer networking / IPv4 / Network mapping / IPv6 / ICMP Time Exceeded / Ping / Computing / Network architecture / Internet

Scamper: a Scalable and Extensible Packet Prober for Active Measurement of the Internet Matthew Luckie Department of Computer Science University of Waikato Hamilton, New Zealand

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2010-08-25 02:46:02
65Email / Computer networking / Internet privacy / Internet protocols / Internet standards / Proxy server / RADIUS / Active Directory / IP address / Computing / Internet / Network architecture

OCLC Hosted EZproxy Questionnaire Once you have completed this questionnaire and submitted the order form, please send it to [removed] 1. Please complete the following information: Full Library Name: ___________

Add to Reading List

Source URL: www.oclc.org

Language: English - Date: 2014-10-03 15:45:09
66Chamber of commerce

Your Gold Beach Chamber Investment 1. Marketing, Advertising & Networking- $[removed]Facebook Manage and populate an active and highly engaged Gold Beach Oregon Facebook business page. Chamber Scoop

Add to Reading List

Source URL: goldbeach.chamberbusinessgateway.com

Language: English - Date: 2012-11-14 12:34:48
    67Email / Internet protocols / Computer networking / Internet standards / Internet privacy / Proxy server / RADIUS / Active Directory / IP address / Computing / Internet / Network architecture

    OCLC Hosted EZproxy Questionnaire Once you have completed this questionnaire and submitted the order form, please send it to [removed]_

    Add to Reading List

    Source URL: www.oclc.org

    Language: English - Date: 2014-10-03 19:43:47
    68Active Directory / Computing / Information science / Enterprise architecture / System software / Software / Computer networking / Identity management / Organizational Unit

    State of California California Technology Agency Enterprise Architecture Practice Statewide Active Directory Configuration Practice

    Add to Reading List

    Source URL: cio.ca.gov

    Language: English - Date: 2014-05-09 16:26:26
    69Research and Innovative Technology Administration / Wireless networking / Federal Highway Administration / Vehicular communication systems / United States Department of Transportation / Database Marketing Agency / Traffic congestion / Intelligent transportation system / Transport / Land transport / Road transport

    Analysis, Modeling, and Simulation (AMS) Testbed Requirements for Dynamic Mobility Applications (DMA) and Active Transportation and Demand Management (ATDM) Programs

    Add to Reading List

    Source URL: ntl.bts.gov

    Language: English - Date: 2014-01-06 16:27:22
    70Internet privacy / Computer networking / Routing protocols / Network performance / Onion routing / Routing / Tor / Router / Proxy server / Computing / Network architecture / Internet

    Preventing Active Timing Attacks in Low-Latency Anonymous Communication [Extended Abstract] Joan Feigenbaum1? , Aaron Johnson2?? , and Paul Syverson3? ? ? 1

    Add to Reading List

    Source URL: dig.csail.mit.edu

    Language: English - Date: 2011-02-01 14:35:14
    UPDATE