Computer Applications

Results: 4069



#Item
921Digital media / Radio-frequency identification / Digital technology / Human–computer interaction / DASH7 / Internet / Telenor / Technology / Ambient intelligence / Internet of Things

Conference Program Internet of Things Applications Connecting the Intelligence at the Edge From Energy Efficiency, Sustainable Mobility, Industrial Internet to Integrated Smart Cities Tuesday 21st of April 2015, 09:00-17

Add to Reading List

Source URL: www.internet-of-things.no

Language: English - Date: 2015-04-14 16:23:39
922Cloud applications / Computer security / TitanFile / Data synchronization / Secure communication / Hitachi Data Systems / Cloud computing / Computing / Centralized computing

FOR IMMEDIATE RELEASE Contacts: U.S: Harry Ochiai Hitachi Solutions America, Ltd

Add to Reading List

Source URL: www.hitachi-solutions.com

Language: English - Date: 2014-09-23 21:07:33
923Internet privacy / Data privacy / Law / Computer law / HTTP cookie / Information privacy / Data Protection Act / Personally identifiable information / P3P / Ethics / Privacy / Computing

Privacy Policy www.creativeengland.co.uk is a site operated by Creative England. We are a limited company registered in England and Wales under company numberREgistered office address: Creative England 1st Flo

Add to Reading List

Source URL: applications.creativeengland.co.uk

Language: English - Date: 2014-07-01 13:25:11
924Floppy disk / Backup / MIDI 1.0 / MIDI usage and applications / Computer hardware / MIDI / Computing

TABLE OF CONTENTS INTRODUCTION ............................................................................................... 2 FEATURES...................................................................................

Add to Reading List

Source URL: www.mmt8.com

Language: English - Date: 2011-06-19 06:00:07
925Algebraic groups / Lattice / Lattice theory / Œ / Information flow / Abstract algebra / Lie groups / Algebra

APPLICATIONS OF LATTICES TO COMPUTER SECURITY Catherine Meadows Code 5543 Center for High Assurance Computer Systems US Naval Research Laboratory

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2003-07-15 08:50:39
926Technology / Networking hardware / Digi International / Sensors / Wi-Fi / XBee / Power over Ethernet / Serial port / IPad / Computing / Computer hardware / Wireless sensor network

Digi TransPort® WR44 R Enterprise Class Cellular Routers for Rugged Applications All-in-one cellular router with advanced routing/VPN features, designed specifically for use in rugged environments.

Add to Reading List

Source URL: www.digi.com

Language: English - Date: 2015-04-22 10:52:13
927Open-source software / Open source / Software / Open innovation / Commercial open source software / Electronic commerce / Free software / Industry analyst / Commercial open source applications / Software licenses / Law / Computing

Open Source Research Group Department of Computer Sciences Faculty of Engineering Friedrich–Alexander University of Erlangen–Nuremberg Why and How to Forge Open Source Alliances

Add to Reading List

Source URL: dirkriehle.com

Language: English - Date: 2013-02-04 07:02:18
928Business / Computer network security / Computing / Security / Computer security / National security / Electronic business / Electronic commerce / Web applications / Web development

Security - Who is in charge? - The users? Or the system? William List www.gammassl.co.uk

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:17:00
929Internet protocols / OSI protocols / Computer networking / Internet standards / Transmission Control Protocol / Internet protocol suite / Transport layer / Communications protocol / Internet Protocol / Computing / Data / Network architecture

Small Scheme Stack: A Scheme TCP/IP Stack Targeting Small Embedded Applications Vincent St-Amour Lysiane Bouchard

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:33
930Computing / Google Chrome OS / Intranet portal / Electronics / Intranet strategies / Computer networks / Internet privacy / Intranet

KM COLUMN SEPTEMBERIntegrating applications into the

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:39:11
UPDATE