Computer configuration

Results: 1629



#Item
171System software / Software / Computer configuration / Environment variable / Computing

WALLACE STATE SUMMER 2015 BOOK LISTINGS ACADEMIC NOTICE: BOOKSTORE HOURS ARE: MONDAY-WEDNESDAY 7:30 AM -- 6:00 PM THURSDAY 7:30 AM -- 4:30 PM

Add to Reading List

Source URL: bookstore.wallacestate.edu

Language: English - Date: 2015-05-15 12:23:40
172Serial ATA / Adaptec / Solid-state drive / RAID / Disk array controller / SCSI / Hard disk drive / PMC-Sierra / Smart Response Technology / Computer hardware / Computing / Computer storage

ADAPTEC FLEXIBLE CONFIGURATION T ECHNICAL BRI E F Flexible Configuration Options for Adaptec Series 8 (12Gb/s) and Adaptec Series 7 (6Gb/s) SAS/SATA RAID Adapters High-density rack storage environments

Add to Reading List

Source URL: www.adaptec.com

Language: English - Date: 2014-03-26 16:33:42
173Apple Inc. / Wireless networking / Bonjour / Mac OS X / Wi-Fi / Computer network security / Zero configuration networking / Wireless LAN / IPhone / Computing / Network protocols / Software

H&D Wireless Wi-Fi support for BonjourTM Software stack on the Atmel 32-bit AVR platform H&D Wireless announces first support for Bonjour SW stack on the 32bit AVR. Bonjour widely simplifies the installation of new devic

Add to Reading List

Source URL: www.hdwireless.se

Language: English - Date: 2010-05-20 03:12:12
174Network address translation / IP address / Dynamic Host Configuration Protocol / Overlay network / Virtual Private LAN Service / Peer-to-peer / Private network / Windows Vista networking technologies / SmoothIT project / Network architecture / Computer architecture / Computing

Tempered Networks Technical White Paper Technical White Paper Executive Summary The Tempered Networks solution is a network segmentation product based on the

Add to Reading List

Source URL: www.temperednetworks.com

Language: English - Date: 2015-03-27 19:16:25
175Security Technical Implementation Guide / Defense Information Systems Agency / Videotelephony / Videoconferencing / Information technology management / Technology / Computer security / Security / Configuration management

UNCLASSIFIED VIDEO SERVICES POLICY SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW

Add to Reading List

Source URL: www.freeporttech.com

Language: English - Date: 2015-03-31 15:07:35
176Science / Infographics / Scientific modeling / Visualization / Computer-aided design / Product data management / Business rules engine / Application software / Information technology management / Product lifecycle management / Business software

Pacelab Cabin Next-generation aircraft and cabin configuration With high-end visualization capabilities and a smart GUI concept for electronic catalogs, Pacelab Cabin is a powerful aircraft and cabin configurator which

Add to Reading List

Source URL: www.pace.de

Language: English - Date: 2015-04-09 03:46:22
177Security / Computing / Carnegie Mellon University / Computer emergency response team / Request Tracker / Threat / Information security / Attack / Computer security / Computer network security / Cyberwarfare

State of New Mexico Statewide Architectural Configuration Requirements Title: Incident Response and Reporting Standard S-STDEffective Date: August 19, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:43
178Cyberwarfare / TSE / Multi-user / Information security / Vulnerability / IT risk management / Security controls / Computer security / Data security / Security

State of New Mexico Statewide Architectural Configuration Requirements Title: IT Risk Management Standard S-STD003.001 Effective Date: April 7, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:18
179Data General / RAID / IOPS / Serial ATA / IBM SAN Volume Controller / Hitachi Adaptable Modular Storage / Computer hardware / Computing / CLARiiON

penguinpunk.net vnx5700 configuration guidelines revision 0.1 synopsis The following is a simple document providing information and background on a number of configuration guidelines specific to EMC’s VNX5700 (Block).

Add to Reading List

Source URL: www.penguinpunk.net

Language: English - Date: 2011-12-01 23:13:45
180Security / Network security / Firewall / DMZ / Vulnerability / End point security / Application firewall / Information security audit / Computer network security / Computer security / Cyberwarfare

State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:22
UPDATE