Virtual Computer

Results: 8252



#Item
561Education / Online education / Educational technology / Distance education / Higher education / Open educational resources / Massive open online course / Iversity / Computer-mediated communication / Virtual learning environment / Self-monitoring / Small private online course

MERLOT Journal of Online Learning and Teaching Vol. 11, No. 2, June 2015 Students’ Impression Management in MOOCs: An Opportunity for Existential Learning?

Add to Reading List

Source URL: jolt.merlot.org

Language: English - Date: 2015-07-24 12:22:52
562Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
563Computing / Network architecture / Network protocols / Computer networking / Network performance / Networking hardware / Bandwidth / Network switch / Throughput / Router / Virtual private network / Synchronous optical networking

1 UltraScience Net: Network Testbed for Large-Scale Science Applications Nageswara S. V. Rao

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2005-03-10 15:30:57
564Concurrent computing / Computing / Parallel computing / Memory management / Computer architecture / Virtual memory / Central processing unit / Page / Paging / Draft:Cache memory / Parallel random-access machine

Memory Coherence in Shared Virtual Memory Systems 1 Kai Li and Paul Hudak Department of Computer Science Yale University New Haven, CT 06520

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-12-08 14:33:01
565

Securing Stateful Grid Servers through Virtual Server Rotation Matthew Smith, Christian Schridde and Bernd Freisleben Dept. of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3, DMarburg

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2010-11-03 12:17:51
    566Computer architecture / Software / System software / Physical-to-Virtual / Windows Server / Hyper-V / Virtualization / Virtual machine / VM / Windows Server 2008 R2 / Windows 7

    Migrating Your Existing Environment to Scale Computing’s HC3 System TM Planning your Migration The first step in your migration to Scale’s HC3TM System is to determine each VMs candidacy for running in a virtual

    Add to Reading List

    Source URL: www.scalecomputing.com

    Language: English - Date: 2014-12-09 05:07:28
    567Computing / Network architecture / Computer networking / Networking hardware / Internet protocols / Cryptographic protocols / 6WIND / Data Plane Development Kit / Open vSwitch / IPv6 / Network function virtualization / Virtual Router Redundancy Protocol

    S P E E DS E R I E S TurboAppliances Ÿ Throughput for cost-effec ve rou ng and

    Add to Reading List

    Source URL: www.6wind.com

    Language: English - Date: 2015-12-18 16:04:59
    568Software / Adobe Flash / Visual arts / Adobe Flash Player / Adobe software / Real-Time Messaging Protocol

    Michigan Virtual Career Fair Job Seeker Guide Computer Checks It is essential that you run the following Computer Checks WELL IN ADVANCE of the live event day to ensure that your computer is set up properly to perform s

    Add to Reading List

    Source URL: www.michiganvirtualcareerfair.com

    Language: English - Date: 2015-07-22 12:01:14
    569Computing / Network architecture / Computer architecture / Virtual private networks / Computer network security / Internet privacy / Crypto-anarchism / Quality of service / Differentiated services / SoftEther VPN / Mobile virtual private network

    Microsoft Word - Dokument2

    Add to Reading List

    Source URL: www.kutter-fonds.ethz.ch

    Language: English - Date: 2010-05-16 10:11:22
    570Computing / Virtual private networks / Computer network security / Network architecture / Tunneling protocols / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / SoftEther VPN / OpenVPN

    ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

    Add to Reading List

    Source URL: itserv.ait.ac.th

    Language: English - Date: 2012-10-23 04:58:00
    UPDATE