Network service

Results: 12749



#Item
371Security / Prevention / Safety / National security / Computer security / Cybercrime / Cyberwarfare / Cryptography / Denial-of-service attack / Information security

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2012-04-10 09:15:59
372Computing / Network architecture / Concurrent computing / File sharing networks / Telecommunications engineering / Internet broadcasting / Multimedia / Peercasting / Peer-to-peer / Quality of service / Streaming media / Clientserver model

Volume is not Enough: SVC-aware Server Allocation for Peer-assisted Streaming Julius R¨uckert∗ , Osama Abboud† , Martin Kluge∗ , and David Hausheer∗ ∗ Peer-to-Peer Systems Engineering, Technische Universit¨a

Add to Reading List

Source URL: www.cnsm-conf.org

Language: English - Date: 2013-10-11 08:36:07
373Matter / Water supply / Personal life / Water / Kitchen utensil / Kitchenware / Tap water / Dishwasher / Dishwashing / Water supply network / Drinking water / Icemaker

PLEASE KEEP THIS NOTICE! Illinois Department of Public Health Retail Food Service Establishment Operating Guidelines BOIL WATER ORDERS OR INTERRUPTED WATER SERVICE To continue operating under “boil water” orders or i

Add to Reading List

Source URL: www.champcoprepares.com

Language: English - Date: 2009-01-28 16:57:52
374Computing / Concurrent computing / Technology / Internet backbone / Internet / Peering / Content delivery network

GLOBAL INTERNET GEOGRAPHY EXECUTIVE SUMMARY Executive Summary TeleGeography’s Global Internet Geography Research Service provides analysis and statistics on Internet capacity and traffic, IP transit pricing, and backb

Add to Reading List

Source URL: www.telegeography.com

Language: English - Date: 2015-08-18 14:52:59
375Computing / Cloud infrastructure / Cloud computing / Network performance / Grid computing / Quality of service / Streaming / Service-level agreement / Eucalyptus / Elasticity / Intercloud / MTA SZTAKI Laboratory of Parallel and Distributed Systems

 Special Issue itGrid vs Cloud – A Technology

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2011-08-09 05:43:08
376Technology / Digital media / Computing / Internet service provider / Internet / Remote Access Service / Dial-up Internet access / Free / Integrated Services Digital Network / Web hosting service / Data Control & Systems / Web accelerator

Bridging the Digital Divide: Open Systems Fill the Bill According to the latest report of the National Telecommunications and Information Administration (NTIA), Internet growth continues to skyrocket. For example, the sh

Add to Reading List

Source URL: www.steinwrites.com

Language: English - Date: 2009-03-19 17:34:19
377Rail transport / Transport / Concessionary fares on the British railway network

DecemberExtension of Return-Fare Discount Period Thank you for using the Kobe-Kansai Airport Bay Shuttle service. The return-fare discount that is in effect until the end of March 2016 has proven

Add to Reading List

Source URL: www.kobe-access.jp

Language: English - Date: 2016-02-03 04:34:14
378Technology / Wireless / Mobile telecommunications / Mobile technology / LTE / Telecommunications / UMTS / Fast Dormancy / E-UTRA / Radio Resource Control / Radio Network Controller / General Packet Radio Service

TS.18 Fast Dormancy Best Practises v1.0 (Current)

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-08-13 11:19:52
379Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
380Security / Crime prevention / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / National Health Service

Security Policy Category Summary

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2016-04-07 10:06:24
UPDATE