Computer Applications

Results: 4069



#Item
691Business / Surgery / Invasiveness of surgical procedures / Workflow

R EAL - TIME 3D RECONSTRUCTION : APPLICATIONS TO COLLISION DETECTION AND SURGICAL WORKFLOW MONITORING Contact Details: Prof. Dr. Nassir Navab and Dipl.-Inf. (FH) Stefan Holzer, M.Sc. Computer Aided Medical Procedures

Add to Reading List

Source URL: www.robotic.dlr.de

Language: English - Date: 2011-08-02 20:00:00
692Computer science education / Authorization / Electrical engineering / Application software

Proposal  to  Update  Supplementary  Authorization  in  Computer  Concepts  and  Applications    –  June  2015   Title:   Proposed   Amendments   and   Additions

Add to Reading List

Source URL: www.cslnet.org

Language: English - Date: 2015-05-29 01:09:25
693Computing / Telecommunications engineering / Content-control software / Fortinet / Networking hardware / IEEE 802.11 / Wi-Fi / Wireless security / MIMO / Technology / Computer network security / Wireless networking

FortiAPTM-221B and 223B Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without c

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:30
694Sports media / Television / National Hockey League / Sportsnet One / Comcast SportsNet Northwest / Rogers Communications / Television in Canada / Sportsnet

! ONETWOSEE CHOSEN BY CANADA’S SPORTSNET TO PROVIDE ADVANCED FAN ENGAGEMENT TECHNOLOGY AND PRODUCTS FOR MOBILE, TABLET AND PERSONAL COMPUTER FOR NHL GAMES Applications to Enhance Sportsnet’s NHL “Live Tracker” PH

Add to Reading List

Source URL: onetwosee.com

Language: English - Date: 2014-11-12 17:09:17
695File system / Computer data storage / Replication / Disk image / Disk formatting / System software / Computing / Software

Globecom 2013 Workshop - Cloud Computing Systems, Networks, and Applications UKAI: Centrally Controllable Distributed Local Storage for Virtual Machine Disk Images Keiichi Shima

Add to Reading List

Source URL: member.wide.ad.jp

Language: English - Date: 2014-02-25 20:13:39
696Computer-mediated communication / Spamming / Web applications / Web 2.0 / Webmail / Yahoo! Mail / Password / Hotmail / Spam / Computing / Email / Internet

Click on the applicant log in from: www.spo.state.nm.us or www.governmentjobs.com, and click on ‘Forgot Username’ and/or ‘Forgot Password’ Below the Sign In button, click on Forgot Username. On the next page, ent

Add to Reading List

Source URL: www.spo.state.nm.us

Language: English - Date: 2014-05-16 11:28:40
697Broadband / Fiber to the x / Local loop / Network architecture / Telephony / SIP Trunking / Computer architecture / Electronic engineering / Electronics / Fiber-optic communications

FIBER TO THE BUILDING (ON-RAMP) The Gold Standard for Internet, Voice and Data Network Solutions Network demands from voice/data/video, SaaS and cloud-based applications are driving higher bandwidth requirements for busi

Add to Reading List

Source URL: www.alpheus.net

Language: English - Date: 2014-10-29 12:21:39
698Risk / Information technology management / Computer-aided audit tools / ACL / Accounting software / Management / Internal audit / Audit / Data mining / Information technology audit / Accountancy / Auditing

THE UNIVERSITY OF ALABAMA SYSTEM DATA ANALYST The University of Alabama System is receiving applications for the position of Data Analyst in the Office of Internal Audit. The data analyst designs and executes data mining

Add to Reading List

Source URL: uasystem.ua.edu

Language: English - Date: 2015-04-03 09:22:14
699Internet / Application software / Form / IOS / Computer architecture / Computing / Smartphones / Email

Instructions for Submitting IMS 2014 Student Design Application Applications Due, April 1, 2014 Thank you for considering entering your work into the 2014 IMS Student Design Competition. This competition is an important

Add to Reading List

Source URL: www.ims2014.org

Language: English - Date: 2014-03-10 13:52:39
700Electronic engineering / IEEE 802.1X / Wireless security / Fortinet / Wi-Fi / IEEE 802.11 / Wireless LAN / MIMO / Wireless access point / Computer network security / Computing / Technology

FortiAPTM-11C, 14C, 28C Secure Remote Access Points The Need for Secure Remote Access Points Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromisi

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:08:51
UPDATE