Computer Applications

Results: 4069



#Item
701Computing / Telecommunications engineering / Content-control software / Fortinet / Networking hardware / IEEE 802.11 / Wi-Fi / Wireless security / MIMO / Technology / Computer network security / Wireless networking

FortiAPTM-221B and 223B Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without c

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:30
702Software / Computer peripherals / Electronic musical instruments / Axiom / M-Audio / Digital audio workstation / Pro Tools / MIDI keyboard / MIDI usage and applications / Computer hardware / Classes of computers / MIDI

Axiom User Guide Legal Notices This guide is copyrighted ©2010 by Avid Technology, Inc., with all rights reserved. Under copyright laws, this guide may not be duplicated in whole or in part without the written consent

Add to Reading List

Source URL: c3.zzounds.com

Language: English
703Artificial intelligence applications / Signal processing / Computer accessibility / Speech recognition / Speech synthesis / Principal component analysis / Mean / Spectral density / Variance / Statistics / Computational linguistics / Data analysis

Abstract-Papers up to 4 pages should be submitted using this format

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2004-08-27 16:14:45
704Cloud applications / Computer security / Data synchronization / Online backup services / Dropbox / Salesforce.com / Cloud computing / Computing / Centralized computing

CLOUD ADOPTION & RISK IN GOVERNMENT REPORT Q4Published Q1 2015

Add to Reading List

Source URL: fcw.com

Language: English - Date: 2015-02-26 11:52:46
705Computer security / Network Behavior Anomaly Detection / Deep packet inspection / Netflow / Network intelligence / Application firewall / Packet capture / Firewall / Stateful firewall / Computer network security / Computing / Cyberwarfare

White Paper DPI and Metadata for Cybersecurity Applications How vendors can improve solutions for new market demands by filling the gap between COTS

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:08:00
706Electronic engineering / Electronics / Digital electronics / Computer buses / Quasi-bidirectional I/O / Motherboard / Integrated circuits / IC power supply pin / Power supply

WS2811 Signal line 256 Gray level 3 channal Constant current LED drive IC Feature Applications

Add to Reading List

Source URL: www.tweaking4all.nl

Language: English - Date: 2014-01-04 11:42:44
707Privacy / Identification / Automatic identification and data capture / Animal identification / Wireless / Traceability / Ear tag / Surveillance / National Animal Identification System / Radio-frequency identification / Human–computer interaction / Technology

Herd Recording Managers Workshop Traceability – Electronic system applications Introduction of identification systems in South Eastern Europe Dr. Ferdinand Schmitt

Add to Reading List

Source URL: www.icar.org

Language: English - Date: 2015-02-04 17:41:00
708Object-oriented programming / Software design patterns / Design Patterns / Object / ILOG / Programming paradigm / Applications of artificial intelligence / Software engineering / Computing / Computer programming

Civil-Comp Press, 2005. Proceedings of the Eighth International Conference on the Application of Artificial Intelligence to Civil, Structural and Environmental Engineering, B.H.V. Topping (Editor), Civil-Comp Press, S

Add to Reading List

Source URL: intra.info.uqam.ca

Language: English - Date: 2009-08-04 12:55:01
709Computer network security / Software testing / Application firewall / OWASP / Vulnerability / Application security / Copyright law of the United States / Copyright / Computer security / Cyberwarfare / Security

The Self Healing Cloud Protecting Applications and Infrastructure with Automated Virtual Patching Dan Cornell CTO, Denim Group @danielcornell

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-10-02 13:43:52
710Electronic engineering / IEEE 802.1X / Wireless security / Fortinet / Wi-Fi / IEEE 802.11 / Wireless LAN / MIMO / Wireless access point / Computer network security / Computing / Technology

FortiAPTM-11C, 14C, 28C Secure Remote Access Points The Need for Secure Remote Access Points Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromisi

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:33
UPDATE