System

Results: 641854



#Item
41Backup software / System software / Utility software / Computing / Backup / Data synchronization / Incremental computing / Data security / Incremental backup / Veeam Backup & Replication / Backup Exec

AerieTM 36 Clutch Teradactyl® builds a turnkey purpose built backup system capable of supporting over 500TB of primary storage in daily backup windows. The Aerie™ 36 Clutch Industrial BackupAppliance is designed for b

Add to Reading List

Source URL: www.teradactyl.com

Language: English
42Computing / Linear Tape File System / Electromagnetism / Backup / Spectra Logic / Computer data storage / Tape drive / Cloud storage

Converged Storage System Spectra® BlackPearl® Converged Storage System Simply and affordably preserves your data forever • Solving the problem of costly and complex approaches to digital preservation by combining

Add to Reading List

Source URL: www.teradactyl.com

Language: English
43

Fudge System Reference Document This document contains information on the Fudge roleplaying game system, and presents the core body of the Fudge RPG material available for use under the Open Game License. Copyrights, Tra

Add to Reading List

Source URL: wanderinghorse.net

Language: English - Date: 2018-10-25 11:40:39
    44Chemistry / Chemical elements / Water pollution / Drinking water / Water / Tap water / Water filter / Arsenic / Magnesium in biology / Water treatment / Chlorine

    Chemical and Odour Removal of the UltraStream Water Treatment System

    Add to Reading List

    Source URL: alkaway.co.uk

    Language: English - Date: 2017-11-01 21:58:41
    45

    My Bloody Friggin Campaign A fantasy world for the Fudge Roleplaying System _http://wanderinghorse.net/gaming/fudge/_ Abstract:

    Add to Reading List

    Source URL: wanderinghorse.net

    Language: English - Date: 2018-10-25 11:40:39
      46

      1 SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel∗ and Yupeng Zhang† Research, † University of Maryland

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 16:01:37
        47Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

        StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

        Add to Reading List

        Source URL: censorbib.nymity.ch

        Language: English - Date: 2014-05-19 10:30:48
        48Systems engineering / Digital electronics / Formal methods / Systems science / Electronic engineering / Logic simulation / Simulation / Verification / SIGNAL / Scientific modelling / Software verification and validation

            ADVANCE     ADVANCED  DESIGN  AND  VERIFICATION  ENVIRONMENT  FOR  CYBER-­‐PHYSICAL  SYSTEM  

        Add to Reading List

        Source URL: www.advance-ict.eu

        Language: English - Date: 2015-10-27 08:55:01
        49Modeling and simulation / Cognition / Systems engineering / Experimental psychology / Human behavior / Motivation / Scientific modelling / Economic model / Business process management / ACT-R / Conceptual model / System

        On the no´s and must´s in system design Werner Damm joint work with Bernd Finkbeiner, Universität des Saarlandes, and Astrid Rakow, Carl von Ossietzky Universität Oldenburg

        Add to Reading List

        Source URL: www.avacs.org

        Language: English - Date: 2015-09-28 03:05:32
        UPDATE