Virtual network

Results: 5567



#Item
21Virtual Private Network (VPN) Access Agreement This agreement is between the employee or third party noted below and the University. The purpose of this agreement is to specify the terms and conditions applicable to the

Virtual Private Network (VPN) Access Agreement This agreement is between the employee or third party noted below and the University. The purpose of this agreement is to specify the terms and conditions applicable to the

Add to Reading List

Source URL: csn.nebraska.edu

- Date: 2015-08-27 08:49:04
    22Investigating Interdomain Routing Policies in the Wild Ruwaifa Anwar1, Haseeb Niaz1, David Choffnes2, Italo Cunha3, Phillipa Gill1, Ethan Katz-Bassett4 Stony Brook University, 2Northeastern University,

    Investigating Interdomain Routing Policies in the Wild Ruwaifa Anwar1, Haseeb Niaz1, David Choffnes2, Italo Cunha3, Phillipa Gill1, Ethan Katz-Bassett4 Stony Brook University, 2Northeastern University,

    Add to Reading List

    Source URL: irtf.org

    Language: English - Date: 2015-10-31 03:07:55
    23Future of the Internet Initiative White Paper  Internet Fragmentation: An Overview  January 2016

    Future of the Internet Initiative White Paper Internet Fragmentation: An Overview January 2016

    Add to Reading List

    Source URL: www3.weforum.org

    Language: English - Date: 2016-01-22 03:03:53
    24DATA SHEET  FortiGate/FortiWiFi® 80C Series High Performance UTM for Small Networks

    DATA SHEET FortiGate/FortiWiFi® 80C Series High Performance UTM for Small Networks

    Add to Reading List

    Source URL: www.boll.ch

    Language: English - Date: 2016-08-04 09:36:10
    25Data Sheet  Cisco SPA525G2 5-Line IP Phone Cisco Small Business 5-Line Business IP Phone with Enhanced Connectivity and Media for a New Level of User Experience

    Data Sheet Cisco SPA525G2 5-Line IP Phone Cisco Small Business 5-Line Business IP Phone with Enhanced Connectivity and Media for a New Level of User Experience

    Add to Reading List

    Source URL: enterprise.vonage.com

    Language: English - Date: 2015-11-20 10:42:11
    26Web Intelligence and Virtual Enterprises, 2009  Bridging Virtual Communities: The Object-Subscription Protocol James King and Jalal Kawash

    Web Intelligence and Virtual Enterprises, 2009 Bridging Virtual Communities: The Object-Subscription Protocol James King and Jalal Kawash

    Add to Reading List

    Source URL: wic.litislab.fr

    Language: English - Date: 2013-12-09 08:25:54
    27arXiv:1510.02855v1 [cs.LG] 10 OctAtomNet: A Deep Convolutional Neural Network for Bioactivity Prediction in Structure-based Drug Discovery

    arXiv:1510.02855v1 [cs.LG] 10 OctAtomNet: A Deep Convolutional Neural Network for Bioactivity Prediction in Structure-based Drug Discovery

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2015-10-12 20:36:12
    28Hunting Mice with Microsecond Circuit Switches Nathan Farrington, George Porter, Yeshaiahu Fainman, George Papen, Amin Vahdat† UC San Diego UC San Diego and Google†

    Hunting Mice with Microsecond Circuit Switches Nathan Farrington, George Porter, Yeshaiahu Fainman, George Papen, Amin Vahdat† UC San Diego UC San Diego and Google†

    Add to Reading List

    Source URL: nathanfarrington.com

    Language: English - Date: 2016-02-22 00:30:08
    29NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

    NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

    Add to Reading List

    Source URL: www.rbha.net

    Language: English - Date: 2013-04-11 02:24:06
    30Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

    Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

    Add to Reading List

    Source URL: rich.recoil.org

    Language: English - Date: 2006-05-23 08:53:35