Computer systems

Results: 26232



#Item
421Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Centre, Cisco WebEx Training Centre, Cisco WebEx Support Centre and C

Add to Reading List

Source URL: www.webex.co.uk

Language: English - Date: 2016-04-06 00:10:51
422Security / Prevention / Safety / Actuarial science / Computer network security / Computer security / Enterprise architecture / Department of Defense Architecture Framework / UPDM / Risk management / Threat / Vulnerability

Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

Add to Reading List

Source URL: www.kdmanalytics.com

Language: English - Date: 2015-03-10 10:01:35
423Azul Systems / Financial markets / Latency / Low latency / Azul / Computer performance / Technology / Computing / Science and technology

How NOT to Measure Latency An attempt to share wisdom... Matt Schuetze, Product Management Director, Azul Systems ©2013 Azul Systems, Inc.

Add to Reading List

Source URL: www.azul.com

Language: English - Date: 2016-03-08 15:15:46
424Academia / Metaphysics / Philosophy / Formal sciences / Complex systems theory / Crime prevention / Cryptography / National security / Complexity / Emergence / Computer security / The Age of Spiritual Machines

Security Watch Rebecca T. Mercuri Superscaled Security Exponential increases in computational speed, memory capacity, and

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 17:32:49
425Computer architecture / Classes of computers / Computing / Embedded systems / Embedded Linux / Linux-based devices / Single-board computers / Motherboard / Gumstix / Computer-on-module / Texas Instruments DaVinci / Linux kernel

Gumstix Announces IceSTORM Computer­on­Module  Drives embedded graphics applications in demanding, rugged environments    ® ​ REDWOOD CITY, Calif., July 21, 2015 ​

Add to Reading List

Source URL: www.gumstix.com

Language: English - Date: 2015-07-22 02:13:56
426Religion / Philosophy of religion / Language / American Jains / Dualism / Jainism / Nontheism / Raj Jain / Java APIs for Integrated Networks / Jain / Abstract / Introduction

CSE567M Computer Systems Performance Analysis Project Guidelines

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2006-12-28 14:36:36
427Security / Prevention / Safety / National security / Business continuity / Civil defense / Resilience / Cyberwarfare / Systemically important payment systems / Computer security / Cyber threat intelligence / Cyber-attack

Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-08-16 13:52:59
428Computing / Security / Data management / Ambient intelligence / Internet of things / New ICT / Smart city / Cloud computing / Big data / Computer security

Agenda: Technology Focus Sessions Attend the T-Systems Technology focus session to see solutions in action and also learn how to deliver on today’s needs while innovating for the future. * Please note this is An examp

Add to Reading List

Source URL: thefuturenow.t-systems.co.za

Language: English - Date: 2015-10-01 00:46:42
429Embedded systems / Classes of computers / Computer hardware / Computing / Embedded Linux / Linux-based devices / Single-board computers / Motherboard / Gumstix / Computer-on-module / Handheld game console

Gumstix Arbor Series Designed for Handheld and Smart Home Devices Now supporting 4.3”, 5.0” and 7.0” NewHaven Capacitive Touchscreens REDWOOD CITY, Calif. November 17, 2015 — Gumstix, Inc. the premier provider of

Add to Reading List

Source URL: www.gumstix.com

Language: English - Date: 2015-11-17 15:57:02
430Computer architecture / Computing / Software / Embedded operating systems / Finite automata / Finite-state machine / OSEK / Real-time operating system / Model checking / Kernel / Protection ring / Embedded system

Back to the Roots: Implementing the RTOS as a Specialized State Machine Christian Dietrich, Martin Hoffmann, Daniel Lohmann Department of Computer Science 4 - Distributed Systems and Operating Systems Friedrich-Alexander

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2016-07-14 16:23:27
UPDATE