Network architecture

Results: 18731



#Item
511Computing / Internet / Dark web / Internet security / Secure communication / Tor / Network architecture

Employment Application • THE BASICS • Name (last, first, middle)____________________________________________________ My Current Address _______________________________________________________________________________

Add to Reading List

Source URL: macrinabakery.com

Language: English - Date: 2013-09-05 18:30:59
512Computing / Software / Computer networking / Emerging technologies / Network architecture / Configuration management / Software-defined networking / OpenFlow / Nox / ONOS / OpenDaylight Project / App Store

Isolating and Tolerating SDN Application Failures with LegoSDN Balakrishnan Chandrasekaran Duke University Brendan Tschaen

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2016-03-31 23:58:46
513Computing / Ethernet / Network architecture / Network protocols / Working groups / IEEE standards / Network topology / IEEE 802.3 / Network switch / Virtual LAN / Medium-dependent interface / Broadcast radiation

Part Number: KEY FEATURES AND BENEFITS • Class I, Division 2 (CID2) certified for potentially hazardous locations

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-05-13 17:33:37
514Bell System / Computing / Network architecture / Cloud applications / Business / American brands / Salesforce.com / MPLS VPN / AT&T / Trademark

8244 NetBond+Salesforce 1

Add to Reading List

Source URL: www.synaptic.att.com

Language: English - Date: 2016-02-04 13:12:25
515Computing / File sharing / Concurrent computing / Distributed computing / Network architecture / Peer-to-peer / Telecommunications engineering / Distributed hash table / Social peer-to-peer processes / Overlay network / Computer network / Mesh networking

itDecentralized Communication against Surveillance and Privacy Violation Kalman Graffi

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-05-17 12:18:49
516Computing / Network architecture / Routing protocols / Computer networking / Internet Standards / TRILL / Internet protocols / Routing bridge / OSI protocols / Data center bridging / Link-state routing protocol / IS-IS

1 Donald E. Eastlake 3rd Co-Chair, IETF TRILL Working Group , +

Add to Reading List

Source URL: www.nanog.org

Language: English - Date: 2010-10-03 14:17:38
517Computing / Internet / Network architecture / Border Gateway Protocol / Business intelligence / Peering / Big data / Denial-of-service attack / Business analytics / Internet transit / Internet backbone / IP hijacking

TO P U S E C AS E S WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

Add to Reading List

Source URL: www.kentik.com

Language: English - Date: 2016-07-14 17:33:25
518Computing / Software / Computer architecture / Parallel computing / MySQL / Cluster computing / Cross-platform software / Network management / Computer cluster / Oracle RAC / Scalability / Load balancing

Bitrix Site Manager Bitrix Web Cluster Contents Computer Clusters ..................................................................................................................... 3 Introducing Bitrix Web Cluster...

Add to Reading List

Source URL: www.bitrixsoft.com

Language: English - Date: 2011-04-06 07:34:13
519Internet / Domain name system / Computing / Network architecture / Domain name registry / Domain name / Uniform Domain-Name Dispute-Resolution Policy / WHOIS / Domain name speculation / Draft:.vote

dotAmsterdam B.V. Terms & Conditions for the registration and maintenance of .amsterdam domain names .amsterdam Terms & Conditions

Add to Reading List

Source URL: nic.amsterdam

Language: English - Date: 2016-06-09 09:45:29
520Computing / Network architecture / Internet / Routing protocols / Routing algorithms / Routing / Internet Standards / Internet protocols / Open Shortest Path First / Border Gateway Protocol / Router / Control plane

Fast Control Plane Analysis Using an Abstract Representation Aaron Gember-Jacobson∗◦ , Raajay Viswanathan∗◦ , Aditya Akella◦ , Ratul Mahajan† ◦ University of Wisconsin-Madison, † Microsoft Research

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2016-07-25 15:03:50
UPDATE