System Architecture

Results: 17564



#Item
191Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
192Computing / Computer architecture / Technology / Emerging technologies / Needham /  Massachusetts / Positive train control / Wind River Systems / Internet of things / VxWorks / PTC / Embedded system / Computer security

The Intelligence in the Internet of Things INTERNET OF THINGS: TRANSPORTATION USE CASE has implications that extend beyond rail systems. Regardless of the mode of transportation, system operators are concerned with the

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2014-04-09 23:14:42
193Computing / Network file systems / Data management / Computer architecture / Internet protocols / Storage area networks / Network File System / Clustered file system / Computer data storage / File server / Lustre / File system

Failure-Atomic File Access in an Interposed Network Storage System Darrell Anderson and Jeff Chase Department of Computer Science Duke University 

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2000-06-05 20:25:52
194Information technology / Government / Information / Information technology management / Strategic management / Fusion center / Surveillance / United States Department of Homeland Security / Business process management / Fusion / Information system / Enterprise architecture

DEPAR DHS/DOJ Fusion Process Technical Assistance Program and Services

Add to Reading List

Source URL: www.ncirc.gov

Language: English - Date: 2010-07-15 14:15:48
195Computing / Cache / ApplianSys / Domain name system / Server appliance / WAN optimization / Computer architecture / Network architecture / 19-inch rack / Internet service provider / Quality of service / Bandwidth

CACHEBOX solutions for Service Providers OVERVIEW As a service provider you want to build a reputation for fast, reliable access to the Internet. You also want to grow

Add to Reading List

Source URL: www.appliansys.com

Language: English - Date: 2015-07-14 11:59:51
196Computer architecture / Computing / Software / Inter-process communication / Micro-Controller Operating Systems / Message queue / DSPACE GmbH / Real-time operating system / FlexRay / Microkernel / CAN bus

An experience report on the integration of ECU software using an HSF-enabled real-time kernel Martijn M.H.P. van den Heuvel, Erik J. Luit, Reinder J. Bril, Johan J. Lukkien, Richard Verhoeven and Mike Holenderski Departm

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2016-07-14 16:23:27
197Computing / Computer architecture / System software / Windows / Device driver / Frame grabber / Operating system / Inspecta / Installation

Level 1 for Inspecta-5 Software-Manual Level 1 -Software Manual For Inspecta-5 Frame Grabbers

Add to Reading List

Source URL: www.mikrotron.de

Language: English - Date: 2015-05-21 09:11:14
198Computing / Computer architecture / Software / Network file systems / Internet protocols / Network File System / File locking / Struct / Stat / Mkdir / Server / File system

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallMidterm Exam Answers

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
199Mathematics / Academia / Physics / Category theory / Theory / Conceptual system / Dimension / Mathematical logic / Mathematical analysis / Algebra / Emmy Noether / Foundations of mathematics

Higher-Dimensional Category Theory The architecture of mathematics Eugenia Cheng November 2000

Add to Reading List

Source URL: cat.boffosocko.com

Language: English - Date: 2015-06-01 01:56:30
200Computing / Software / Computer architecture / Smartphones / Mobile app / Google Play / Recommender system / Personal /  Inc. / Android / IOS / Internet privacy

Mobile App Recommendations with Security and Privacy Awareness Hengshu Zhu1 Hui Xiong2∗

Add to Reading List

Source URL: staff.ustc.edu.cn

Language: English - Date: 2014-11-13 08:20:35
UPDATE