Computer networking

Results: 7870



#Item
341Computing / Technology / Wireless networking / Computer network security / Computer networking / Networking hardware / Computer network / Telecommunications engineering / Wi-Fi / Personal computer / Wireless access point / Computer security

CURRICULUM POLO On-site Training for OFWs

Add to Reading List

Source URL: ilab.dole.gov.ph

Language: English - Date: 2015-11-26 00:49:12
342IEEE standards / Computing / Networking hardware / Ethernet / Ubiquiti Networks / Fastener / Socket wrench / Screw / Computer hardware / Poe / Electromagnetism

High-Performance 16 dBi airMAX® CPE Model: NBE-M5-16 Introduction Thank you for purchasing the Ubiquiti Networks® NanoBeam®.

Add to Reading List

Source URL: dl.ubnt.com

Language: English - Date: 2015-10-22 14:24:54
343Computing / Computer networking / Computer network security / Network architecture / Network management / Local area networks / Open vSwitch / Software-defined networking / Traffic flow / Firewall / Load balancing / NetFlow

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
344Computing / Internet / Content delivery network / Network architecture / Akamai Technologies / Internet service provider / Distributed data storage / Computer networking / Streaming / Hacking

1 Internet Structural Analysis by End-to-End Measurement NTT Communications

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
345Computing / Concurrent computing / Distributed computing / Cloud storage / Computer networking / Data center / Data management / Distributed data storage / Tennessee / Tax / United States Code

PUBLIC CHAPTER NOSENATE BILL NOBy Norris, Dickerson, Stevens Substituted for: House Bill NoBy McCormick, Kevin Brooks, Hazlewood, Daniel, Zachary

Add to Reading List

Source URL: share.tn.gov

Language: English - Date: 2016-04-28 14:24:15
346Computing / System administration / Computer networking / Virtualization / Data center / Downtime / High availability software / Cloud computing / High availability / Virtual Iron / Desktop virtualization

MAINTAINING VIRTUAL SYSTEM UPTIME IN TODAY’S TRANSFORMING IT INFRASTRUCTURE February 2016  Jim Rapoza, Senior Research Analyst & Editorial Director, Information Technology

Add to Reading List

Source URL: www.stratus.com

Language: English - Date: 2016-03-08 20:54:09
347SIGMOD / International Conference on Mobile Computing and Networking / Database / Computing / Computer science / Information technology / SIGMOBILE / Symposium on Principles of Database Systems

CALL FOR PAPERS MobiDE 2007: Sixth International ACM Workshop on Data Engineering for Wireless and Mobile Access June 10, 2007, Beijing, China (in conjunction with SIGMOD/PODShttp://www.cse.psu.edu/mobide07

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2007-03-14 23:23:35
348Computing / Network architecture / Wireless networking / Transmission Control Protocol / Network packet / Routing / Computer networking / Packet loss / Dynamic Source Routing

Semester Thesis WS06 Multi-Hop Routing for Wireless Sensor Networks David Dominic Landis

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:58
349Computing / Computer hardware / Ethernet / Server hardware / Fibre Channel / Computer networking / HP BladeSystem / HP Virtual Connect / QLogic / VMware ESXi / Blade server / Fibre Channel over Ethernet

Where IT perceptions are reality Application Report Infrastructure Refresh Keeps Ticket Sales Flowing Featuring

Add to Reading List

Source URL: www.itbrandpulse.com

Language: English - Date: 2015-02-22 11:40:48
350Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
UPDATE