Open Computer Network

Results: 913



#Item
121Internet / Electronic engineering / Wireless networking / Computer law / Video on demand / Network neutrality / Wireless broadband / Verizon Wireless / Verizon Communications / Internet access / Broadband / Technology

Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.CIn the Matter of Open Internet Remand

Add to Reading List

Source URL: publicpolicy.verizon.com

Language: English - Date: 2014-10-14 22:00:40
122Computer storage / Backup software / Zmanda / Advanced Maryland Automatic Network Disk Archiver / BackupPC / Backup / Disk staging / NDMP / MySQL / Software / System software / Computing

Amanda The Open Source Backup Platform UM-LUG (March 26, 2008) Dustin J. Mitchell

Add to Reading List

Source URL: wiki.zmanda.com

Language: English - Date: 2009-07-16 01:49:52
123Computing / Data / Flow control / Internet protocols / TCP congestion avoidance algorithm / Slow-start / Transmission Control Protocol / Retransmission / Congestion window / TCP/IP / Network performance / Network architecture

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2002; 2:3–20 (DOI: wcm.30) Open issues on TCP for mobile computing Vassilis TsaoussidisŁ,† Computer Science

Add to Reading List

Source URL: utopia.duth.gr

Language: English - Date: 2003-05-19 11:15:47
124Computing / Security / HTTP / HTTP cookie / Computer network security / Information privacy / Computer security / P3P / In re Gateway Learning Corp. / Ethics / Privacy / Internet privacy

Open Study College - Privacy Policy GENERAL Your privacy is important to us. This privacy policy is intended to give you confidence in the privacy and security of the personal information we obtain from you whether you u

Add to Reading List

Source URL: www.openstudycollege.com

Language: English - Date: 2015-01-28 06:06:06
125Unix / Network architecture / Data security / Hacking / Internet protocols / Firewall / User identifier / Stateful firewall / Setuid / Computer network security / Computing / Computer security

CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-04-06 01:23:14
126Computer network security / Computing / Wireless networking / Eduroam / Wi-Fi / Password

Connecting to eduroam via Android The following instructions apply to using the Eduroam wireless service on the Android. • From the home screen, tap the arrow to open the All Programs menu

Add to Reading List

Source URL: ku.ac.ke

Language: English - Date: 2014-09-10 01:31:20
127Economy of Sheffield / Plusnet / Network neutrality / Electronics / Computing / Digital media / Internet service provider / Internet / Peer-to-peer / Computer law / Internet access / British Telecom

Submission for the European Commission’s public consultation on the open internet and net neutrality Free Software Foundation Europe September 30, 2010 Introduction

Add to Reading List

Source URL: fsfe.org

Language: English - Date: 2012-07-20 10:04:20
128Nippon Telegraph and Telephone / Open Computer Network / Biogeochemistry / Oceanography / Science / Knowledge / Nature

Microsoft Word - SOC - Fall 07 FINAL.doc

Add to Reading List

Source URL: www.soest.hawaii.edu

Language: English - Date: 2011-09-07 21:41:55
129Phylogenetics / NP-complete problems / Graph / Maximum parsimony / Routing algorithms / Tree / Phylogenetic network / Steiner tree problem / Directed acyclic graph / Graph theory / Mathematics / Theoretical computer science

Kannan and Wheeler Algorithms for Molecular Biology 2012, 7:9 http://www.almob.org/contentRESEARCH Open Access

Add to Reading List

Source URL: www.almob.org

Language: English
130Computer network security / Network performance / Internet / Data transmission / Proxy server / Web browsers / Open proxy / Computer networking / Computing / Internet privacy

AUH RA USE OF PROXY AUHRA GUIDE This guide contains a quick guide and a more detailed guide for managers on how to appoint proxies in AUHRA. This will usually be relevant when a manager and his or her secretary are

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2013-09-02 05:27:14
UPDATE