Communication protocol

Results: 2818



#Item
581Data management / Knowledge representation / Metadata / Technical communication / Distributed Active Archive Center / File Transfer Protocol / NetCDF / Computing / Data / Information

PDF Document

Add to Reading List

Source URL: www.oceanobs09.net

Language: English - Date: 2011-08-03 12:57:10
582Knowledge / Communication / Archival science / Academic publishing / Research / EPrints / Open educational resources / Open Archives Initiative Protocol for Metadata Harvesting / Digital Repository Infrastructure Vision for European Research / Open access / Information / Science

Repository Repositioned: a new way of doing things as OER changes Pat Lockley, No Affiliation Abstract Repositories remain an excellent tool with which to host content. However, was we move

Add to Reading List

Source URL: conference.oeconsortium.org

Language: English - Date: 2014-04-07 03:06:55
583Software / Email client / Internet Message Access Protocol / Message transfer agent / Gmail / Mail / IPhone / Push email / Yahoo! Mail / Email / Computing / Computer-mediated communication

Setting Up iPhoneâ„¢ Email Technical Manual: Configuration and Setup Setting Up an IMAP Email Account 1. Tap the Settings icon. Document Updated: 2/09

Add to Reading List

Source URL: secure.toolkitfiles.co.uk

Language: English - Date: 2009-08-07 05:28:42
584Internet / Internet protocols / Network architecture / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Computing

Client Server HTTPS SSL/TLS Session for SPDY This sequence diagram covers the establishment of a SSL/TLS connection for sending Google SPDY data. The protocol flow covers:

Add to Reading List

Source URL: www.eventhelix.com

Language: English - Date: 2015-03-03 14:20:22
585Internet / Simple Mail Transfer Protocol / Voice-mail / Non delivery report / Sendmail / SMS / Push email / Anti-spam techniques / Email / Computer-mediated communication / Computing

W H I T E PA P E R Public Network The Impact of Machine-Generated Messages on Enterprise Email Infrastructure

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2012-05-08 14:39:08
586Computer-mediated communication / Web 2.0 / Internet Message Access Protocol / Mail / Web applications / EmailTray / Comparison of webmail providers / Computing / Email / Internet

CURL with IMAP protocol ! With CURL plugin functions you can use the IMAP protocol for downloading emails. The plugin connects to the imap server, performs a

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2014-07-24 11:16:16
587Teleconferencing / Electronic engineering / Polycom / Mobile technology / Telephony / Session Initiation Protocol / Videotelephony / Voice over IP / Computer-mediated communication

InFocus-Visual-Communication-Services-EU-03NOV14

Add to Reading List

Source URL: www.infocus.com

Language: English - Date: 2015-03-04 19:53:30
588Internet / Calendaring software / Microsoft Outlook / Post Office Protocol / Internet Message Access Protocol / Comparison of webmail providers / Microsoft Exchange Server / Email / Computing / Computer-mediated communication

Superhub Limited I. Service Category (A) Productivity Apps Table 1a: Productivity Apps Items (Service items passing all General, Security and Technical Requirements)

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2012-12-09 21:44:08
589Electronics / Session Initiation Protocol / Voice over IP / Videoconferencing / Microsoft Lync Server / Comparison of VoIP software / Videotelephony / Electronic engineering / Computer-mediated communication

avi_C3Call_solutions_diagram_deployment_rd4

Add to Reading List

Source URL: www.avistar.com

Language: English - Date: 2011-06-24 16:56:40
590Technology / Cryptographic protocols / Computing / Key management / Secure communication / Temporal Key Integrity Protocol / Wireless security / Distributed coordination function / Wi-Fi / Wireless networking / IEEE 802.11 / Cryptography

Advanced Wi-Fi Attacks Using Commodity Hardware Mathy Vanhoef Frank Piessens iMinds-DistriNet

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2014-12-05 07:10:36
UPDATE