Virtual Network Computing

Results: 3536



#Item
71Network protocols / Computing / OpenFlow / Local area networks / Virtual LAN / Nox

Indiana University OpenFlow Deployment 1 GE 10 GE IU Core Infastructure

Add to Reading List

Source URL: e-geni.grnoc.iu.edu

Language: English - Date: 2010-03-12 14:34:20
72Computing / Network protocols / Network architecture / Emerging technologies / Computer networking / Configuration management / Software-defined networking / Network virtualization platform / OpenFlow / Virtual LAN / Nicira / Network switch

Toward Transitional SDN Deployment in Enterprise Networks Dan Levin, Marco Canini, Stefan Schmid, and Anja Feldmann TU Berlin / T-Labs Mid to large enterprise campus networks present complex operational requirements: The

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2013-11-29 09:03:54
73Computer network security / Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Virtual private network / Information security / Firewall

JOHN MORGAN SALOMON e-mail: www.zog.net ____________________________________

Add to Reading List

Source URL: www.zog.net

Language: English - Date: 2012-04-24 18:10:16
74Software / System software / Computing / USB / Special folder / File Explorer / Computer file / Trash / Live USB / Virtual folder

THE ICON-Newsletter of the Interactive Computer Owners Network July 2016 Andrew Cummins WHAT’S INSIDE Page President, ICON Computer Users Group

Add to Reading List

Source URL: www.iconusersgroup.org

Language: English - Date: 2016-07-08 13:33:42
75Computing / Network architecture / Computer architecture / Telecommunications engineering / Network protocols / Internet Standards / Tunneling protocols / Multiprotocol Label Switching / Quality of service / Computer network / Virtual LAN / Internet protocol suite

Fact Sheet Individual Pages2

Add to Reading List

Source URL: www.time.com.my

Language: English - Date: 2016-05-23 19:00:35
76Computing / Network architecture / Computer network security / Internet / Internet Standards / Dynamic Host Configuration Protocol / Network service / IP address / Virtual private network / Computer network / Gateway

Microsoft Word - SnapGearQuickInstalldoc

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2004-02-15 19:36:51
77Computing / Network protocols / Computer network security / Computer networking / Network architecture / Networking hardware / Software-defined networking / OpenFlow / Router / Packet processing / Routing / Virtual LAN

Merlin: A Language for Provisioning Network Resources Robert Soulé* Shrutarshi Basu† Parisa Jalili Marandi* Fernando Pedone* Robert Kleinberg† Emin Gün Sirer† Nate Foster† * University of Lugano † Cornell Uni

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:52
78Computing / Network architecture / Network function virtualization / AudioCodes / Technology / Business / Wind River Systems / Session border controller / Cloud computing / VNF

™ AN INTEL COMPANY AUDIOCODES AND WIND RIVER Service Provider and Enterprise Virtual SBC for Unified Communications Services

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2016-07-19 05:32:22
79Computing / Computer networking / Computer network security / Network architecture / Network management / Local area networks / Open vSwitch / Software-defined networking / Traffic flow / Firewall / Load balancing / NetFlow

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
80Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
UPDATE