Protocol II

Results: 394



#Item
161Online chat / Scalable Vector Graphics / GTK+ / Inkscape / Portable software / Extensible Messaging and Presence Protocol / Computing / Software / Free software

Teams: Jabber-like stuff: Jonas, Steven Inkscape-like Stuff: Jason, Matt, Brandi Major Goals: I: Trial Message II: Send Inkscape Messages and Display

Add to Reading List

Source URL: inkboard.sourceforge.net

Language: English - Date: 2005-05-17 23:09:45
162Road transport / On-board diagnostics / Data link connector / OBD-II PIDs / Vehicle inspection in the United States / Keyword Protocol / Vehicle inspection / Vehicle Identification Number / MOT test / Transport / Land transport / Car safety

Microsoft Word - Attachment to PC-LDT OBD IM flowchart Ver8.3.doc

Add to Reading List

Source URL: www.eti-home.org

Language: English - Date: 2009-10-02 10:52:12
163Keyword Protocol / Hayes command set / Data structure alignment / Computing / OBD-II PIDs / Technology / PICAXE / Modems / On-board diagnostics / Command and Data modes

ELM323 OBD (ISO) to RS232 Interpreter Description Features

Add to Reading List

Source URL: www.elmelectronics.com

Language: English - Date: 2009-12-08 00:39:22
164Internet / OpenLDAP / Lightweight Directory Access Protocol / X.500 / Slapd / LDAP Data Interchange Format / Active Directory / Directory services / Computing / Software

LDAP Documentation By: Kotari Vijay (B2004035) C. Koundinya (B2004021) Contents I). Basics II). Installation

Add to Reading List

Source URL: indem.iiita.ac.in

Language: English - Date: 2011-04-07 03:00:01
165Message-oriented middleware / Software engineering / Inter-process communication / RabbitMQ / Internet protocols / Middleware / Erlang / Open Telecom Platform / Advanced Message Queuing Protocol / Computing / Erlang programming language / Concurrent computing

RabbitMQ[removed]:16 Part II

Add to Reading List

Source URL: www.rabbitmq.com

Language: English - Date: 2015-02-20 08:29:22
166Debt bondage / Human trafficking / Slavery / International criminal law / Human trafficking in Australia / Protocol to Prevent /  Suppress and Punish Trafficking in Persons /  especially Women and Children / Crime / Organized crime / Crimes against humanity

Ad-Hoc Experts’ Group II Workshop on Legislative Development Port Dickson, Malaysia[removed]September[removed]Key elements for the effective investigation, cooperation and

Add to Reading List

Source URL: www.baliprocess.net

Language: English - Date: 2012-10-01 20:50:24
167Committee on Economic /  Social and Cultural Rights / United Nations Economic and Social Council / Law / Economic /  social and cultural rights / Human rights / International Covenant on Economic /  Social and Cultural Rights / United Nations Human Rights Committee / Optional Protocol to the International Covenant on Economic /  Social and Cultural Rights / Human rights instruments / International relations / Ethics

Institute for International Law Monitoring Human Rights Compliance: Part II 24 November 2010 Prof. Christine Kaufmann

Add to Reading List

Source URL: www.ivr.uzh.ch

Language: English - Date: 2011-07-17 09:14:55
168Object-oriented programming / Interfaces / Java programming language / Protocol / Java / Virtual function / C Sharp syntax / Computing / Software engineering / Computer programming

Dealing with Conflicting Interfaces: Part II - .NET Venkat Subramaniam [removed] http://www.agiledeveloper.com/download.aspx Abstract In Part I we discussed the issue of conflicting or colliding interfac

Add to Reading List

Source URL: www.agiledeveloper.com

Language: English - Date: 2010-08-05 09:38:44
169United Nations Angola Verification Mission II / United Nations Security Council Resolution / Angola / History of the United Nations / Lusaka Protocol

S UNITED NATIONS Security Council

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2013-09-19 11:44:58
170System software / Network file systems / Internet standards / Remote procedure call / Portmap / Network File System / Nmap / Server Message Block / Transmission Control Protocol / Computing / Internet protocols / Software

Swiss Cyber Storm II Case: NFS Hacking Axel Neumann Compass Security AG

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:27
UPDATE