Computer configuration

Results: 1629



#Item
271Configuration management / Software development process / Aegis / Software project management / Revision control / Baseline / Concurrent Versions System / Software configuration management / Apache Ant / Software / Computing / Computer programming

Aegis A Project Change Supervisor Peter Miller Australian Geological Survey Organisation

Add to Reading List

Source URL: aegis.sourceforge.net

Language: English - Date: 2008-03-14 03:32:37
272Graphics file formats / Animation software / Web development software / Adobe Systems / Microsoft PowerPoint / Adobe Flash / Adobe AIR / Portable Document Format / Adobe Acrobat / Software / Computing / Cross-platform software

APPENDIX A Computer Hardware and Software Configuration in the Student Computer Centre Hardware Configuration Room M301 (64 sets)

Add to Reading List

Source URL: www.polyu.edu.hk

Language: English - Date: 2014-09-04 05:31:10
273Computing / Configuration files / EComStation / Drive letter assignment / USB mass-storage device class / Installation / SYS / USB flash drive / Universal Serial Bus / System software / Computer architecture / OS/2

Chapter 1: Welcome This manual will try to ease the installation process of eComStation 1.0 onto your system. Please refer to it if you have questions or problems during your install. Especially important are the section

Add to Reading List

Source URL: www.ecomstation.com

Language: English - Date: 2001-10-04 22:25:58
274Internet standards / Windows Server / Microsoft Windows / Videotelephony / IP address / Dynamic Host Configuration Protocol / Windows / Password / Gateway / Computing / Network architecture / Computer architecture

DP-501 eHold Player User’s Guide User’s Notice No part of this manual, including the products and software described in it, may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated in

Add to Reading List

Source URL: www.eletech.com

Language: English - Date: 2012-08-01 17:22:10
275Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
276Robot control / Motion planning / Theoretical computer science / Visibility graph / Configuration space / Path / Directed graph / Probabilistic roadmap / Graph theory / Mathematics / Topology

COMP: FallBased on slides from J. Latombe @ Stanford & David Hsu @ Singapore) Path Planning

Add to Reading List

Source URL: gamma.cs.unc.edu

Language: English - Date: 2013-09-04 01:13:27
277Network architecture / Computer architecture / Virtual private network / IPsec / Billion / Cisco Systems VPN Client / VoIP VPN / Cisco 837 / Computer network security / Computing / Tunneling protocols

TheGreenBow IPSec VPN Client Configuration Guide Billion BiGuard 10 WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2008-11-01 15:41:44
278Data / Cryptographic protocols / Network architecture / Crypto-anarchism / Internet privacy / Virtual private network / IPsec / Password / Profile configuration file / Computer network security / Computing / Tunneling protocols

Manually Setting up CarletonIntranetVPN with MAC 1. Open up System Preferences and select ‘Network’ 2. Under Network Preferences, click on the “+” icon 3. Select the Interface as “VPN”, the VPN Type as “Cis

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
279BIOS / Linux / Computers and the environment / Advanced Configuration and Power Interface / Linux kernel / HLT / PowerTOP / Hyper-threading / Idle / Computing / Computer architecture / System software

Controlling Processor C-State Usage in Linux A Dell technical white paper describing the use of C-states with Linux operating systems Stuart Hayes | Enterprise Linux Engineering

Add to Reading List

Source URL: en.community.dell.com

Language: English - Date: 2013-11-20 16:31:30
280Network architecture / Computer architecture / Internet privacy / Internet protocols / Virtual private network / IPsec / Password / Profile configuration file / UT-VPN / Computer network security / Computing / Tunneling protocols

Manually Setting up Carleton VPN with MAC 1. Open up System Preferences and select ‘Network’ 2. Under Network Preferences, click on the “+” icon 3. Select the Interface as “VPN”, the VPN Type as “Cisco IPSe

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
UPDATE