Remote access

Results: 1393



#Item
111Image retrieval / Image search / Internet search engines

  Designed for users who consistently search in Allen County, INFidlar Technologies has designed Laredo, a remote access product, with your objectives in mind. Laredo’s innovative technology and 24-hour access to the

Add to Reading List

Source URL: www.allencountyrecorder.us

Language: English - Date: 2014-11-06 13:41:39
112Remote desktop / Computer access control / Citrix Systems / XenApp / Smart card / Multi-factor authentication / Security token / Password manager / Single sign-on / Card reader / Authentication / Access token

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
113Supercomputers / Server hardware / Computer networks / Computer networking / Computer memory / InfiniBand / Cisco Unified Computing System / Remote direct memory access / Mellanox Technologies / Cisco Nexus switches / Cisco Systems / Altix

Cisco UCS C200 M2 Server Powered by Intel Xeon Processors: 10 Gigabit Ethernet Matches QDR InfiniBand for Clustered HPC Performance Brief November 2011

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-11-10 02:21:10
114Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
115Computer access control / Radio electronics / Wireless / Radio-frequency identification / Automotive accessories / Authentication / Challengeresponse authentication / Remote keyless system / Keychain / Transponder / Distance-bounding protocol

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
116Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
117

CLIENT SUCCESS STORY LONGTIME KeepItSafe CLIENT UPGRADES TO KeepItSafe DISASTER RECOVERY (DR) TO ENSURE REMOTE ACCESS TO THEIR SERVERS IN THE EVENT OF A DISASTER THE CHALLENGE

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
    118Computing / Transaction processing / Data management / Concurrency control / Software / Databases / Remote direct memory access / Software transactional memory / Serializability / Two-phase locking / Isolation / Extensible Storage Engine

    Fast In-memory Transaction Processing using RDMA and HTM Xingda Wei, Jiaxin Shi, Yanzhe Chen, Rong Chen, Haibo Chen Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems,

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2015-10-06 13:44:13
    119Computer memory / Computer architecture / Central processing unit / Cache / CPU cache / Parallel computing / Row hammer / Dynamic random-access memory / Shared memory / Microarchitecture / Draft:Cache memory / Cold boot attack

    HexPADS: a platform to detect “stealth” attacks Mathias Payer Purdue University Abstract. Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their p

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    120

    INTERNET IN NORTH KOREA Poster in a school in Pyongyang. The technology can often be seen in the propaganda stuff, specially in the remote areas, even if few can access to it. North Korea is not linked to the Internet.

    Add to Reading List

    Source URL: ericlafforgue.com

    Language: English - Date: 2015-01-29 12:47:59
      UPDATE