Virtual Computer

Results: 8252



#Item
291Transaction processing / Data management / Fault-tolerant computer systems / Two-phase commit protocol / Paxos / Distributed transaction / Replication / Transaction processing system / Concurrency control / Consensus / Durability / Virtual synchrony

Two Phase Commit on Persistent Key Value Store with Data ReplicationDistributed Systems Final Project Xiangyao Yu Shuotao Xu

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2015-01-21 21:28:03
292Computer network security / Network file systems / Linux Professional Institute Certification / Directory services / Virtual private networks / Computer access control / FreeIPA / Kerberos / Server Message Block / Active Directory / Apache HTTP Server / Security-Enhanced Linux

 LPIC-3: Linux Enterprise Professional Certification LPIC-3 303: Security

Add to Reading List

Source URL: www.futurecert.com

Language: English - Date: 2016-07-22 03:13:26
293Interpolation / Computer-aided design / Curves / Technical drawing / 3D computer graphics / Bzier curve / Non-uniform rational B-spline / French curve / B-spline / Spline / Flat spline / Sketch

Digital Styling for Designers: Sketch Emulation in Computer Environment Seok-Hyung Bae1,3 , Won-Sup Kim2 , and Eun-Sook Kwon2 1 Virtual Reality Research Center, Korea Advanced Institute of Science and

Add to Reading List

Source URL: www.dgp.toronto.edu

Language: English - Date: 2003-08-19 08:09:50
294Computer printing / CUPS / KDE / Printer / PostScript / Spooling / Line Printer Daemon protocol / Ghostscript / Portable Document Format / Virtual printer / Print server / Operating system

The KDEPrint Handbook Version−b Kurt Pfeifle, Danka Deutschland GmbH Copyright © 2001 Kurt Pfeifle

Add to Reading List

Source URL: vesta.informatik.rwth-aachen.de

Language: English - Date: 2003-03-10 07:08:19
295Memory management / Virtual memory / Disk file systems / Memory segmentation / Fragmentation / Paging / Disk partitioning / Page table / Page / File system / Ext3

Combining Memory Management and Filesystems in an Operating Systems Course Hans-Georg Eßer () Security Research Group, Dept. of Computer Science, Friedrich-Alexander-University Erlangen-Nuremberg The

Add to Reading List

Source URL: hgesser.de

Language: English - Date: 2011-07-02 21:29:34
296Distributed computing / Network architecture / Telecommunications engineering / Network topology / Overlay network / Topology control / Routing / Peer-to-peer / Topology / Node / HyperCast / Computer network

ON THE VIRTUAL TOPOLOGY OF LOOSELY COUPLED MULTICOMPUTERS French Investigators Cyril Gavoille (PI) Laboratoire Bordelais de Recherche en Informatique (LaBRI), Universit´e de Bordeaux. Pierre Fraigniaud Laboratoire d’I

Add to Reading List

Source URL: dept-info.labri.u-bordeaux.fr

Language: English - Date: 2009-03-26 06:46:53
297Computer network security / ISO standards / Computer access control / Access control / Internet protocols / Common Criteria / Security Target / Authentication / Computer security / Key management / Password / Virtual private network

collaborative Protection Profile for Network Devices

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:18
298Computer mice / Virtual DJ / DJ equipment / MIDI / Computer mouse / Mouse button / DJ mix / Widget / Button / VDJ

VirtualDJ 8 – American Audio VMS4 1 Table of Contents

Add to Reading List

Source URL: www.virtualdj.com

Language: English - Date: 2015-08-01 17:35:31
299Internet protocols / Cryptographic protocols / Internet Standards / Computer network security / Tunneling protocols / IPsec / Virtual private network / Cisco Systems / Simple Network Management Protocol / Transport Layer Security / Cisco routers / Password

Cisco IOS 15.5M Router Security Policy Cisco Integrated Services Router (ISRISR, 1921 ISR, 1941 ISR, 2901 ISR, 2911 ISR, 2921 ISR, 2951 ISR, 3925 ISR, 3925E ISR, 3945 ISR, 3945E ISR, 5915 ESR and 5940 ESR Firmware

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:23:46
300Computer network security / Network architecture / Computer security / Cloud computing / Cloud infrastructure / Virtual LAN / Virtual private network / Zscaler / Wireless security

AppGate-Context-Aware-Dynmic-Access-Infographic-rev6-15

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2016-02-24 15:29:34
UPDATE