Id Software

Results: 2394



#Item
1

Baofeng programming software Making the Baofeng UV-3R and probably the other Baofeng hand held radios legal. Some time ago I bought a Baofeng UV-3R and its programming cable. The cable came with some crude instructions t

Add to Reading List

Source URL: www.philipstorr.id.au

Language: English - Date: 2013-09-16 07:01:29
    2

    Software Only Biometrics to Authenticate Student ID Report of Pilot with the University of Texas System TeleCampus Prepared by: Lori McNabb MS Assistant Director, Student and Faculty Services University of Texas System T

    Add to Reading List

    Source URL: biosig-id.com

    Language: English - Date: 2016-01-21 00:15:08
      3

      IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, MANUSCRIPT ID Exploring the Design Tradeoffs for ExtremeScale High-Performance Computing System Software Ke Wang, Abhishek Kulkarni, Michael Lang, Dorian Arnold, an

      Add to Reading List

      Source URL: datasys.cs.iit.edu

      - Date: 2016-07-13 18:20:17
        4

        Compliance in Service-oriented Architectures: A Model-driven and View-based Approach Uwe Zdun, Huy Trana , Ta’id Holmes, Ernst Oberortner, Emmanuel Mulo, Schahram Dustdarb a Software Architecture Research Group

        Add to Reading List

        Source URL: eprints.cs.univie.ac.at

        - Date: 2013-12-19 04:27:24
          5

          Webinar and teleconference instructions: In order to view and listen to the webinar, you must download the latest software and use the attendee ID you are presented once connected on the computer. If you want to listen o

          Add to Reading List

          Source URL: www.documents.dgs.ca.gov

          - Date: 2016-05-27 14:19:35
            6

            Emerald Caller-ID Search Version 1.0 Emerald Management Suite

            Add to Reading List

            Source URL: www.iea-software.com

            - Date: 2006-10-31 17:29:08
              7

              Software Engineering Group WTM-2012 Objects with adaptive accessors to avoid STM barriers

              Add to Reading List

              Source URL: www.gsd.inesc-id.pt

              - Date: 2012-04-18 12:46:07
                8Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

                SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

                Add to Reading List

                Source URL: www.rsaconference.com

                Language: English - Date: 2016-07-18 23:27:59
                9Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Recreational Software Advisory Council / Critical infrastructure

                PANELISTS: SESSION ID: SPO02-T11 Ammar Alkassar

                Add to Reading List

                Source URL: norbert-pohlmann.com

                Language: English - Date: 2016-03-23 13:52:21
                10Smartphones / Computing / Computer architecture / Software / Google Nexus / Android

                Information Technology Solutions TacSAD Android Mobile Full Function User Interface for McQ Sensor Products TacS AD A ND RO ID

                Add to Reading List

                Source URL: www.mcqinc.com

                Language: English - Date: 2014-10-25 11:37:16
                UPDATE