Computer Modern

Results: 3984



#Item
421Federal Information Security Management Act / Information security / Vulnerability / Penetration test / Managed security service / Security risk / Application security / Security testing / Security controls / Computer security / Security / Cyberwarfare

Spotlight on Security A Modern Approach to Threat Protection, Detection, and Reactionwww.govconnection.com

Add to Reading List

Source URL: info.pcconnection.com

Language: English - Date: 2015-04-14 16:12:55
422Rhizome / Victor Vasarely / Op art / Sound effect / Flanging / Visual arts / Modern art / Computer art

Triangles 1, Glitchometry series, Daniel Temkin Each image begins as one or a few black squares or circles. They are sonified— imported into an audio editor. Sound effects are added to individual color channels, as if

Add to Reading List

Source URL: lab-zine.com

Language: English - Date: 2013-09-15 02:32:37
423Software / Mathematical finance / Financial economics / Computer network security / Low latency / Latency / Packet capture / Endace / High-frequency trading / Financial markets / Computing / Deep packet capture

FINANCIAL SERVICES OVERVIEW Nine Use Cases for Endace Systems in a Modern Trading Environment Introduction

Add to Reading List

Source URL: www.emulex.com

Language: English
424Cross-platform software / Visual programming languages / Virtual machines / Smalltalk / Squeak / Integrated development environments / Java platform / Etoys / Daniel Henry Holmes Ingalls /  Jr. / Computing / Software engineering / Computer programming

SqueakJS: A Modern and Practical Smalltalk that Runs in Any Browser

Add to Reading List

Source URL: www.hpi.uni-potsdam.de

Language: English - Date: 2015-05-08 07:57:20
425Mosaic / Automation / Workflow / Computer file formats / GXL / Computing

GXL is a geospatial image-processing powerhouse designed to leverage modern computing hardware unlike any other system on the market. Built around automated ortho-mosaic and DEM workflows with unlimited scalability, GXL

Add to Reading List

Source URL: www.pcigeomatics.com

Language: English - Date: 2015-04-28 10:37:14
426Computer-mediated communication / Social information processing / Spamming / Facebook / Electronic mailing list / Email address harvesting / Email marketing / Email / Computing / Internet

• formstack.com • The Marketer’s Guide to Online Forms As a modern marketer, you are operating in an environment that looks far different than it did a few years ago. Formstack was launched to help meet the needs

Add to Reading List

Source URL: www.formstack.com

Language: English - Date: 2015-05-07 11:07:05
427Physics / Quantum cryptography / Cryptography / Emerging technologies / Quantum key distribution / BB84 / Quantum teleportation / Qubit / Quantum computer / Quantum information science / Theoretical computer science / Quantum mechanics

REVIEWS OF MODERN PHYSICS, VOLUME 74, JANUARYQuantum cryptography Nicolas Gisin, Gre´goire Ribordy, Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland (Pu

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
428Modern art / Digital artists / Contemporary art / Digital art / Modern artists / Golan Levin / Zachary Lieberman / Ars Electronica / New media art / Visual arts / Computer art / Art history

Golan Levin http://www.flong.com 3440 Parkview Avenue Pittsburgh, PA, 15213

Add to Reading List

Source URL: www.flong.com

Language: English - Date: 2010-12-25 00:35:49
429Instruction set architectures / Computer errors / Computer memory / Data transmission / Endianness / Metaphors / GNU Debugger / Magic number / Segmentation fault / Computing / Computer architecture / Computer programming

The odd kid on the block or: to boldly run ARM like no one did before Martin Husemann Abstract Modern ARM SoCs offer bi-endian support: the CPU can switch between little and big endian mode. Similar to

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2015-03-17 05:18:30
430Computer network security / Software testing / Metasploit Project / Rapid7 / Penetration test / Phishing / Attack / Hacker / Social engineering / Software / Computer security / Computing

Advanced Threat Tactics with Advanced Threat Tactics teaches a modern penetration testing process using Cobalt Strike and the Metasploit® Framework. Abstract This demonstration and lab-oriented class teaches IT professi

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
UPDATE