Network operating system

Results: 753



#Item
321Cartography / Military science / EUREF Permanent Network / Global Positioning System / GPS navigation device / Regional Reference Frame Sub-Commission for Europe / Geodesy / Technology / GPS

Investigation of Regional Troposphere Processes Using EPN Data J. KRYNSKI, Y.M. ZANIMONSKIY1 Abstract Networks of continuously operating GPS receivers are set up by geodesists, geophysicists, government and

Add to Reading List

Source URL: www.euref.eu

Language: English - Date: 2003-11-27 07:26:08
322Network performance / General Electric / Geographic information system / Insight / Distributed control system / Technology / Information technology management / Infrastructure optimization

Fact Sheet InSight* Knowledge Management Solutions Water and process applications generate or directly affect vast amounts of operating data that can be

Add to Reading List

Source URL: www.gesoftware.com

Language: English - Date: 2014-09-24 14:07:39
323Computer file / Inter-process communication / C / ASP.NET / Operating system / Web storage / Computing / Software / Computer programming

Storing User Profile in .NET Venkat Subramaniam [removed] http://www.agiledeveloper.com/download.aspx Abstract The .NET Security does not permit a .NET application running from a shared network

Add to Reading List

Source URL: www.agiledeveloper.com

Language: English - Date: 2010-08-05 09:38:44
324Remote desktop / Virtual Network Computing / Remote administration software / Cross-platform software / Portable software / TeamViewer / Microsoft Management Console / Operating system / Software / System software / Computing

TeamViewer 8 Manual Management Console Rev[removed]

Add to Reading List

Source URL: www.teamviewer.com

Language: English - Date: 2013-03-25 09:09:51
325Remote desktop / Virtual Network Computing / Remote administration software / Cross-platform software / Portable software / TeamViewer / Operating system / Microsoft Management Console / Software / System software / Computing

TeamViewer 9 Manual – Management Console

Add to Reading List

Source URL: www.teamviewer.com

Language: English - Date: 2014-08-01 08:46:49
326Office equipment / Computing / Hewlett-Packard / JetDirect / Kerberos / Operating system / Password / Common Criteria / Technology / Computer network security / Computer printing / Computer printers

Certification Report HP SMARTC

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2014-10-24 09:14:08
327Computing / Windows XP / Graphical user interfaces / Windows Vista / Screenshot / Checkbox / Features new to Windows XP / Software / Microsoft Windows / System software

August 20, 2013 ITCS QUICK REFERENCE GUIDE: MAP DRIVE TO PIRATEDRIVE Map a Network Drive to Piratedrive NOTE: This tutorial was created using Windows 7 operating system.

Add to Reading List

Source URL: www.ecu.edu

Language: English - Date: 2013-09-11 16:39:25
328System software / Routing / Routers / Cisco Systems / Deep packet inspection / Videotelephony / Cisco PIX / Cisco IOS / Cisco Catalyst / Computing / Server appliance / Computer network security

Supported Devices and Software Versions for Cisco Security Manager 4.0 First Published: June 2010 Revised: June 6, 2011 Cisco Security Manager and its related applications support the devices and operating system versio

Add to Reading List

Source URL: www.cisco.com

Language: English
329Computational neuroscience / Canadian cuisine / Peanut butter / Peanut / Cognitive science / Working memory / Neural network / Brain / ACT-R / Food and drink / American cuisine / Spreads

Chapter 7 Operating System Any system that must operate in a complex and changing environment must be compositional, that is it has to have elemental pieces that can be composed to create its more complex structures.1 Fi

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-10-18 15:49:02
330Crime prevention / National security / Computer network security / Trusted system / Cryptographic hash function / Cryptographic engineering / XTS-400 / Security / Cryptography / Computer security

A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne This thesis is presented for the

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2011-02-17 01:18:57
UPDATE