Computer case

Results: 3867



#Item
741Power supply / Motherboard / PSU / Universal Serial Bus / Computer fan / Electrical connector / Serial ATA / Computer case / Power cord / Computer hardware / IBM PC compatibles / Power supply unit

Introduction Dear customer: Thank you for choosing a COUGAR® power supply unit. Before the installation please read the manual below carefully. If you have any questions, please contact our customer service:

Add to Reading List

Source URL: www.cougargaming.com

Language: English - Date: 2015-03-02 02:39:07
742Intelligence / Espionage / Solaris Trusted Extensions / Raytheon / Computer security / Military intelligence / Security / DCGS-A / National security

CASE STUDY United States Army Analysis and Control Element (ACE) Block II, Distributed Common Ground System – Army (DCGS-A) Customer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
743Pedagogy / Critical pedagogy / Philosophy of education / Educational assessment / Outcome-based education / Competency-based learning / E-learning / School counselor / Assessment in computer-supported collaborative learning / Education / Educational psychology / Standards-based education

PDF Document

Add to Reading List

Source URL: socialwork.case.edu

Language: English - Date: 2014-12-11 08:22:18
744Advertising / Target Corporation / Business / Computing / Economy of the United States / Google / Human–computer interaction / World Wide Web

Case Study | Lyft Growing Lyft’s Ridesharing Community With In-Market Audiences MIGHTY LOGO

Add to Reading List

Source URL: think.storage.googleapis.com

Language: English - Date: 2015-03-20 11:47:00
745Printer driver / Hewlett-Packard / Technology / Computer hardware / Computing / Device drivers

Hp Dv9000 Driver Resource Up-date Every setting maybe acquired manually, just in case you forget to establish your hardware with regards to that device manager. A Sandisk hardware is simply finalizing any app, and yet a

Add to Reading List

Source URL: www.etf.ee

Language: English - Date: 2014-12-09 17:11:36
746Computing / Kerberos / Password / Authentication / Security and safety features new to Windows Vista / SAP Logon Ticket / Computer network security / Computer security / Security

JW Secure and Microsoft’s Read-Only Domain Controller: Kerberos Filter Case Study Bottom Line: Results JW Secure worked closely with Microsoft® IT to implement an extension to their readonly domain controller (RODC) t

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:20:05
747Electronic engineering / Television / DVD / Audio storage / Computer storage media / DVD player / HDMI / Blu-ray Disc / MOD and TOD / High-definition television / Electronics / Consumer electronics

d/Lux/MediaArts - articles and publications - dlux.org.au Presenting Video Exhibitions: Face to Face - a case study John A Douglas In 2009, artists and curators alike are faced with a plethora of new technologies in the

Add to Reading List

Source URL: dlux.org.au

Language: English - Date: 2014-07-25 03:55:15
748Fusion-io / Server hardware / Server / IO / Computer hardware / IOdrive / Computing

First Rate Case Study First Rate Improves Processor Utilization FourFold; Expects Complete ROI Within 6 Months The Challenge First Rate allows investment companies to outsource their business intelligence and to generat

Add to Reading List

Source URL: www.fusionio.com

Language: English - Date: 2012-08-01 22:30:18
749C++ / C programming language / C Standard Library / C dynamic memory allocation / Memory management / Pointer / New / C / Dangling pointer / Computing / Computer programming / Software engineering

Understanding the heap by breaking it A case study of the heap as a persistent data structure through nontraditional exploitation techniques Abstract: Traditional exploitation techniques of overwriting heap metadata has

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:38
750Technology / Privacy / Wireless / Zaragoza / Logistics / Telecommunications engineering / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

6th European Conference on ICT for Transport Logistics RFID TECHNOLOGY ADOPTION IN THIRD LOGISTIC OPERATORS: A MULTIPLE CASE

Add to Reading List

Source URL: www.ecitl.eu

Language: English - Date: 2013-12-02 05:07:59
UPDATE