Computer network

Results: 31604



#Item
141Computing / Cloud computing / Cloud infrastructure / Network file systems / Cloud storage / OpenStack / Computer data storage / Object storage / Rackspace / Storage

Build your own Cloud An Open Source approach to Imagery Storage James Klassen SharedGeo 2012 FOSS4G-NA Washington, DC

Add to Reading List

Source URL: www.sharedgeo.org

Language: English - Date: 2012-09-06 13:35:50
142Voice over IP / Cartography / Geodesy / Geography / Map / Videotelephony / Computer-mediated communication / Computing / Network architecture / Session Initiation Protocol

AN AUTOMATED MAP PRODUCTION SYSTEM FOR THE OWNED TELEPHONE COMPANY ITALIAN STATE D. Pilo and C. Vaccari Kongsberg S.p.A., Italy.

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:40:48
143Information science / Computing / Data management / Information / Computer data storage / Computer storage devices / Recording / Computer architecture / DataDirect Networks / Nearline storage / Storage area network / Digital cinema

Microsoft Word - Content Creation Report, doc

Add to Reading List

Source URL: tomcoughlin.com

Language: English - Date: 2010-03-31 00:04:08
144Software / Computing / Computer architecture / Smartphones / Personal computing / Cloud clients / Mobile software / Mobile technology / Adaptxt / Mobile app / Tablet computer / Windows Phone

Digital innovation Award sponsored by mobbra - mass fan engagement at live events Wireless connectivity at major sporting and entertainment events is extremely difficult to achieve due to network congestion associated w

Add to Reading List

Source URL: www.nextgenevents.co.uk

Language: English - Date: 2015-11-25 09:29:42
145Network architecture / Computing / Fiber-optic communications / Network protocols / Computer architecture / Routing / Automatically switched optical network / Synchronous optical networking / Bandwidth / Multiprotocol Label Switching / Shortest path problem

Improving Restoration Success in Mesh Optical Networks Fang Yu 1, Rakesh Sinha2, Dongmei Wang3, Guangzhi Li3, John Strand2, Robert Doverspike2, Charles Kalmanek 3, and Bruce Cortez 2 1 EECS Department, UC Berkeley, Berke

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 20:21:43
146Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2014-03-02 06:27:58
147Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / International Multilateral Partnership Against Cyber Threats

Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:18
148Computer security / Security / Cyberwarfare / Computer network security / Data security / E-commerce / Security controls / Vulnerability / Cyber security standards / Supply chain attack

GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

Add to Reading List

Source URL: www.geoilandgas.com

Language: English - Date: 2016-08-09 11:53:34
149Security / Computer network security / Cyberwarfare / Geographic information system / Goddard Space Flight Center / Computer security / Database

THE EVOLUTION OF DOMESTIC INFORMATION DISPLAY SYSTEMS: TOWARD A GOVERNMENT PUBLIC INFORMATION NETWORK Edward K. Zimmerman National Telecommunications &

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:31:17
150Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:10
UPDATE