Virtual Computer

Results: 8252



#Item
851Internet standards / Tunneling protocols / Multiprotocol Label Switching / Internet protocols / Pseudo-wire / IPv6 / Virtual private network / Broadband Forum / Border Gateway Protocol / Network architecture / Computing / Computer architecture

TECHNICAL REPORT TR-221 Technical Specifications for MPLS in Mobile Backhaul Networks Issue: Corrigendum 1

Add to Reading List

Source URL: www.broadband-forum.org

Language: English - Date: 2014-09-23 18:56:07
852Server hardware / Redundancy / Risk / Computing / Security / Virtual Router Redundancy Protocol / Fault-tolerant computer systems / Reliability engineering / Server

NG911 ESINet Design Illinois of Technology Yuan Xue – Arun Shanmugam –

Add to Reading List

Source URL: voip.itm.iit.edu

Language: English - Date: 2011-05-16 12:02:11
853Computer security / Virtual private network / Cyberwarfare / UT-VPN / Computer network security / Computing / Password

Name of the Document Classification General Version 1.0

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-09-02 07:37:28
854Remote administration software / Intel vPro / RealVNC / Remote administration / X Window System / Comparison of remote desktop software / X11vnc / Software / System software / Virtual Network Computing

VNC® Viewer Plus Product Information: Overview VNC provides remote access and control over any computer, whether on a local network or anywhere in the world. RealVNC™ technology has played an integral

Add to Reading List

Source URL: www.realvnc.com

Language: English - Date: 2015-06-08 09:12:28
855Network address translation / IP address / Dynamic Host Configuration Protocol / Overlay network / Virtual Private LAN Service / Peer-to-peer / Private network / Windows Vista networking technologies / SmoothIT project / Network architecture / Computer architecture / Computing

Tempered Networks Technical White Paper Technical White Paper Executive Summary The Tempered Networks solution is a network segmentation product based on the

Add to Reading List

Source URL: www.temperednetworks.com

Language: English - Date: 2015-03-27 19:16:25
856Operating system / Ring / Kernel / Capability-based security / Multilevel security / Virtual machine / System software / Security / Computer security

Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:51
857Computer security / Cyberwarfare / Computer network security / Virtual private network / Computing

Name of the Document Classification General Version 1.0

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-05-22 06:30:42
858KVM switch / Out-of-band management / Universal Serial Bus / Digital Visual Interface / RemoteFX / Google Chrome OS / Pano Logic / Computer hardware / Remote desktop / Input/output

fastest link to the cloud cloudLinc Matrix Features Create a managed “Virtual Matrix” with cloudLinc Receivers and Transmitters

Add to Reading List

Source URL: www.cloudiumsystems.com

Language: English - Date: 2015-04-27 07:43:39
859User interface techniques / Virtual reality / Human–computer interaction / User interfaces / Multimodal interaction / Haptic technology / Tactile graphic / Touchscreen / ISO / Human–computer interaction / Input/output / Computing

SIGCHI Conference Paper Format

Add to Reading List

Source URL: www.ivanpoupyrev.com

Language: English - Date: 2013-08-08 00:39:55
860Healthcare in the United States / Computer network security / Internet privacy / Network architecture / Health Insurance Portability and Accountability Act / Medicare / Virtual private network / Hospice / Medicine / Palliative medicine / Health

CASE STUDY AMERICAN HOSPICE SALVAGES MOBILE HEALTH INITIATIVE WITH NCP’S HELP

Add to Reading List

Source URL: www.ncp-e.com

Language: English - Date: 2014-10-24 06:18:29
UPDATE