Open Computer Network

Results: 913



#Item
341Certificate authorities / Comodo Group / Electronic commerce / Computer security / Public key certificate / Code signing / Comodo / S/MIME / GlobalSign / Cryptography / Key management / Public-key cryptography

Cost-Effective PKI Certificates Give IT Powerful Control over Application Usage and a Seamless Experience for End Users When Open Finance Network needed Digital Client Authentication Certificates - one for every financia

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
342Computing / Broadband / Computer law / Digital cable / Rights / Network neutrality / Cable modem / Computer network / Spam / Internet / Internet access / Electronics

Grande Communications’ High Speed Internet Network Management, Service Performance and Terms of Service Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 4

Add to Reading List

Source URL: mm.mygrande.com

Language: English - Date: 2012-11-29 00:09:52
343Graphics hardware / Software / Nvidia / Video cards / OpenCL / CUDA / Graphics processing unit / FLOPS / Berkeley Open Infrastructure for Network Computing / GPGPU / Computer hardware / Computing

Einstein@Home 2012: Progress & Plans for the Future Copyright: Cornell University Copyright: CSIRO Australia

Add to Reading List

Source URL: boinc.berkeley.edu

Language: English - Date: 2012-10-02 08:17:08
344Computing / System software / Internet privacy / Network architecture / Junos / Virtual private network / Cisco IOS / TUN/TAP / IOS / Computer network security / Embedded operating systems / Computer architecture

Penn VPN – Apple iOS Users Date Posted: [removed], Version: v.1.0. INSTRUCTIONS 1. From your Android device open the Google Play store and search for and download Junos Pulse app for free. Note: You may see multiple v

Add to Reading List

Source URL: www.uphs.upenn.edu

Language: English - Date: 2014-11-25 13:11:23
345Cross-platform software / Computer network security / Metasploit Project / Software testing / Open-source software / Nmap / Free and open source software / Open source / Linux / Software / Computing / Software licenses

UTOSC2010Program_8_5_x_5_5.indd

Add to Reading List

Source URL: www.utos.org

Language: English - Date: 2012-12-03 00:33:20
346Computer programming / Advanced Linux Sound Architecture / Callback / Open Sound System / Software / Application programming interfaces / Computing

DisOrder Uniform Audio Problem DisOrder has supports three audio backends from two programs, plus network play. There is considerable model mismatch and duplicated code. Solution

Add to Reading List

Source URL: www.greenend.org.uk

Language: English - Date: 2010-04-18 13:06:47
347Robot / Computer network / ROS / Open-source robotics / Middleware / Automation / Mobile robot / Industrial robot / Robot software / Technology / Robotics / Engineering

DEVICE COMMUNITIES DEVELOPMENT TOOLKIT: AN INTRODUCTION Riccardo Cassinis Paolo Meriggi Department of Electronics for Automation, University of Brescia, Italy [removed], [removed]

Add to Reading List

Source URL: www.ing.unibs.it

Language: English - Date: 2008-01-25 04:01:44
348EnGarde Secure Linux / Security-Enhanced Linux / Computer network security / F-Secure / Secure Shell / Secure Computing / Operating system / Vulnerability / Mandatory access control / Computer security / System software / Software

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux 1. Introduction to Guardian Digital and EnGarde Secure Linux 1.1. Pioneering Open Source Security in an Insecure World Since its inception in 1999, Guar

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 08:56:01
349Cryptography / System software / Password / TrueCrypt / FileVault / BitLocker Drive Encryption / KeePass / Remote backup service / Backup / Software / Cryptographic software / Disk encryption

Find.Decrypt.Open Password Recovery Kit Forensic 2015 v.2 All-in-one password recovery and encrypted evidence discovery solution Passware Kit Forensic finds encrypted files on a computer and network and decrypts them.

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2015-03-24 10:17:05
350Electronics / Media technology / Computer law / Network neutrality / Municipal broadband / National Telecommunications and Information Administration / BT Group / Federal Communications Commission / Comcast / Technology / Internet access / Internet

OPEN TECHNOLOGY INSTITUTE JOSHUA BREITBART

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-03-02 05:08:29
UPDATE