Computer networking device

Results: 175



#Item
151Mobile computers / Acceptable use policy / Computer security / Etiquette / Internet culture / Wireless / Laptop / Internet / E-learning / Technology / Electronics / Wireless networking

SMUHSD Student Technology Resources: Student “Bring You Own Device”­ BYOD and Wireless Policy Providing students and staff with a 21st century digital learning environment is part of the SMU

Add to Reading List

Source URL: sanmateohigh.org

Language: English - Date: 2013-06-17 15:00:50
152Network switch / Power over Ethernet / Los Angeles Police Department / Edge device / Computing / Technology / Electronics / Computer networking / Networking hardware / Ethernet / IEEE standards

A GarrettCom Application Note Magnum Edge Switches Network Los Angeles Police Department (LAPD) Cruisers’ Mobile Communications A Mobile Networking Application ABOUT LOS ANGELES POLICE DEPARTMENT (LAPD) The Los Angele

Add to Reading List

Source URL: www.garrettcom.com

Language: English - Date: 2011-12-19 14:41:45
153Disk file systems / Computer networking / Unix / Network block device / Diskless node / Network file systems / File system / Distributed network block device / XFS / Computing / System software / Software

SYSADMIN Network Block Devices A new mission for the network block device

Add to Reading List

Source URL: w3.linux-magazine.com

Language: English - Date: 2007-02-16 10:29:20
154Telecommunications engineering / Ambient intelligence / Internet of Things / Home automation / ZigBee / Smart device / Wi-Fi / Bluetooth / Home network / Computing / Technology / Computer networking

Business Innovation Observatory Smart Living Connected devices for intelligent homes

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-14 06:11:29
155Computer network security / Electronic engineering / Wi-Fi / Wireless access point / Password / IEEE 802.11 / Service set / Cryptographic protocols / Wireless security / Wireless networking / Technology / Wireless

Connecting to the Rovernet WPA2 Secured Wireless Network with the Windows Mobile 6 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in or

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:17:18
156Wireless / Computing / IEEE 802.11 / Cryptographic protocols / Wi-Fi Protected Access / Wi-Fi / Wireless access point / Service set / Password / Wireless networking / Computer network security / Technology

Connecting to the Rovernet WPA2 Secured Wireless Network with the Droid (Android 2.x OS) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-09-16 14:57:29
157Computer architecture / Ubuntu / Protected Extensible Authentication Protocol / IEEE 802.11 / Technology / GlobalSign / Cryptographic protocols / Wi-Fi Protected Access / Wireless security / Wireless networking / Computer network security / Computing

Connecting to the Rovernet WPA2 Secured Wireless Network with with Ubuntu[removed]Intreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:40:33
158Computer networking / University of Cambridge Computer Laboratory / Xen / Hardware virtualization / I/O virtualization / X86 virtualization / Network virtualization / Paravirtualization / Device driver / System software / Software / Virtual machines

Getting 10 Gb/s from Xen: Safe and Fast Device Access from Unprivileged Domains Kieran Mansley, Greg Law, David Riddoch, Guido Barzini, Neil Turton, and Steven Pope Solarflare Communications, Inc. {kmansley,glaw,driddoch

Add to Reading List

Source URL: www.solarflare.com

Language: English - Date: 2011-06-28 15:05:15
159Cryptographic protocols / Computer security / Cyberwarfare / Windows XP / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Computer network security / Computing / Wireless networking

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:49:47
160Windows NT / Dialog box / Software / System software / Computing / Wireless security / Security and safety features new to Windows Vista / Computer network security / Wireless networking / Windows Vista

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows Vista Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:45:43
UPDATE