Remote access

Results: 1393



#Item
111  Designed for users who consistently search in Allen County, INFidlar Technologies has designed Laredo, a remote access product, with your objectives in mind. Laredo’s innovative technology and 24-hour access to the

  Designed for users who consistently search in Allen County, INFidlar Technologies has designed Laredo, a remote access product, with your objectives in mind. Laredo’s innovative technology and 24-hour access to the

Add to Reading List

Source URL: www.allencountyrecorder.us

Language: English - Date: 2014-11-06 13:41:39
112SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
113Cisco UCS C200 M2 Server Powered by Intel Xeon Processors: 10 Gigabit Ethernet Matches QDR InfiniBand for Clustered HPC Performance Brief November 2011

Cisco UCS C200 M2 Server Powered by Intel Xeon Processors: 10 Gigabit Ethernet Matches QDR InfiniBand for Clustered HPC Performance Brief November 2011

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-11-10 02:21:10
114Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
115Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
116Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
117CLIENT SUCCESS STORY  LONGTIME KeepItSafe CLIENT UPGRADES TO KeepItSafe DISASTER RECOVERY (DR) TO ENSURE REMOTE ACCESS TO THEIR SERVERS IN THE EVENT OF A DISASTER THE CHALLENGE

CLIENT SUCCESS STORY LONGTIME KeepItSafe CLIENT UPGRADES TO KeepItSafe DISASTER RECOVERY (DR) TO ENSURE REMOTE ACCESS TO THEIR SERVERS IN THE EVENT OF A DISASTER THE CHALLENGE

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
    118Fast In-memory Transaction Processing using RDMA and HTM Xingda Wei, Jiaxin Shi, Yanzhe Chen, Rong Chen, Haibo Chen Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems,

    Fast In-memory Transaction Processing using RDMA and HTM Xingda Wei, Jiaxin Shi, Yanzhe Chen, Rong Chen, Haibo Chen Shanghai Key Laboratory of Scalable Computing and Systems Institute of Parallel and Distributed Systems,

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2015-10-06 13:44:13
    119HexPADS: a platform to detect “stealth” attacks Mathias Payer Purdue University Abstract. Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their p

    HexPADS: a platform to detect “stealth” attacks Mathias Payer Purdue University Abstract. Current systems are under constant attack from many different sources. Both local and remote attackers try to escalate their p

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    120INTERNET IN NORTH KOREA  Poster in a school in Pyongyang. The technology can often be seen in the propaganda stuff, specially in the remote areas, even if few can access to it. North Korea is not linked to the Internet.

    INTERNET IN NORTH KOREA Poster in a school in Pyongyang. The technology can often be seen in the propaganda stuff, specially in the remote areas, even if few can access to it. North Korea is not linked to the Internet.

    Add to Reading List

    Source URL: ericlafforgue.com

    Language: English - Date: 2015-01-29 12:47:59