Point-to-point protocol

Results: 329



#Item
241Cancer research / Technology transfer / Intellectual property law / 96th United States Congress / Bayh–Dole Act / Point-to-Point Tunneling Protocol / Patent / Title 35 of the United States Code / Health / Medicine / Technology / National Institutes of Health

MATERIAL TRANSFER AGREEMENT

Add to Reading List

Source URL: ctep.cancer.gov

Language: English - Date: 2014-08-03 16:10:27
242Technology / Covad / Asymmetric digital subscriber line / G.992.5 / Point-to-point protocol over Ethernet / Customer-premises equipment / ISDN digital subscriber line / Internet access / DSL filter / Digital subscriber line / Telephony / Electronics

Covad Service Customer Policies TABLE OF CONTENTS 1. TRADEMARKS AND COPYRIGHTS ..............................................................2  2. COVAD PRODUCTS AND SERVICES ............................................

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2014-10-03 18:56:58
243Network architecture / MX record / IP address / Lightweight Directory Access Protocol / Simple Mail Transfer Protocol / Network address translation / Email / Internet / Computing

SpamTitan Cloud Appliance (SCA) Setup 1. Configure / Edit your MX records The MX record(s) for your mail domain(s) need to be changed to point to the new SCA IP address you have received. Once you have changed your MX re

Add to Reading List

Source URL: www.spamtitan.com

Language: English - Date: 2013-07-01 10:54:47
244Directory service / Lightweight Directory Access Protocol / Web portal / Application server / Electronic commerce / Novell NetWare / EGovernment in Europe / Computing / Software / IPlanet

II. INTRODUCTION The dramatic changes taking place in the marketplace clearly point to a future where government at all levels will need to be able to conduct business electronically. The concept of eGovernment provides

Add to Reading List

Source URL: procurement.sc.gov

Language: English - Date: 2011-04-01 14:21:36
245Computing / Wireless / Cryptographic protocols / Wi-Fi / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wireless networking / Technology / Computer network security

Privacy-Preserving[removed]Access-Point Discovery Janne Lindqvist∗§ Tuomas Aura‡∗ George Danezis‡ Teemu Koponen† Annu Myllyniemi∗ Jussi Mäki∗ Michael Roe‡ ABSTRACT It is usual for[removed]WLAN clients to

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-09-14 15:06:11
246Internet protocols / Internet standards / Modems / Logical Link Control / Integrated Services Digital Network / Network access / Internet protocol suite / File Transfer Protocol / Point-to-point protocol / Computing / Network architecture / Internet

DFS-CS-001 Tokyo Stock Exchange Specification for connecting to Data Feed Server

Add to Reading List

Source URL: www.tse.or.jp

Language: English - Date: 2014-08-24 01:31:42
247Tunneling protocols / Internet privacy / Computer architecture / Network protocols / Virtual private network / Cyberwarfare / Point-to-Point Tunneling Protocol / Split tunneling / Computer network security / Computing / Network architecture

Joebox VPN Server Setup Guide: This guide will offer step by step instructions on how to set up the VPN(PPTP) server on the Joebox and how to configure a client computer to connect to the VPN. 1. After logging into the J

Add to Reading List

Source URL: networkmaine.net

Language: English - Date: 2012-08-06 14:20:14
248IEEE 802.1X / Wireless security / Wi-Fi Protected Access / RADIUS / EAP-SIM / Virtual private network / Point-to-Point Tunneling Protocol / Wi-Fi / IEEE 802.11r-2008 / Computing / Computer network security / Computer security

Deploying iPhone and iPad Virtual Private Networks Secure access to private corporate networks is available on iPhone and iPad using established industry-standard virtual private network (VPN) protocols. Users can easily

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:30:56
249Routing / Internet protocols / Internet standards / Border Gateway Protocol / Peering / Peer-to-peer / Internet exchange point / Causality / Internet transit / Network architecture / Internet / Computing

AS Relationships, Customer Cones, and Validation Matthew Luckie Bradley Huffaker Amogh Dhamdhere

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2013-08-23 13:57:03
250Computer network security / Modems / Logical Link Control / Integrated Services Digital Network / Network access / Virtual private network / IP address / Point-to-point protocol / Internet / Computing / Network architecture / Electronic engineering

Network Connection Specifications Version : 1.08 Date : April 17, 2003 Table of Contents

Add to Reading List

Source URL: boxexchange.com

Language: English - Date: 2013-01-16 21:18:25
UPDATE