Results 11 to 20 of about 366,295 (267)

La explosión de un paradigma

open access: yesVivat Academia, 2003
La historia de la informática, y más en concreto la doméstica, ha tenido un avance espectacular en muy pocos años. Un tiempo en el que hemos pasado de mostruosos ordenadores que nacieron para ejecutar juegos en un principio, de precio astronómico y ...
Jesús Delgado Delgado
doaj   +1 more source

Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2013
Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use, flexibility, sharing application and support for multimedia ...
Omar Ibrahim, Omar AL-Saffar
doaj   +1 more source

Kernel Code Integrity Protection at the Physical Address Level on RISC-V

open access: yesIEEE Access, 2023
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security.
Seon Ha   +3 more
doaj   +1 more source

Faults in Linux 2.6 [PDF]

open access: yes, 2014
In August 2011, Linux entered its third decade. Ten years before, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to
Calvès, Christophe   +5 more
core   +5 more sources

Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]

open access: yes, 2015
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John   +2 more
core   +3 more sources

Web-traffic filtering system

open access: yesЛитьë и металлургия, 2022
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj   +1 more source

Linux

open access: yesJournal of Information Processing and Management, 2001
Analisi dell'approccio marketing open source di ...
PACE, STEFANO, LUCIANO FRATOCCHI
  +6 more sources

Studying Computer Networking Technologies in School: Problems and Suggestions

open access: yesСовременные информационные технологии и IT-образование, 2021
Computer networking technologies are an important part of the information exchange process. In the existing basic textbooks of computer science in grades 7-11, insufficient attention is paid to this topic.
Pavel Romasevich   +2 more
doaj   +1 more source

Digital Forensic on Secure Digital High Capacity using DFRWS Method

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC.
Anton Yudhana, Imam Riadi, Budi Putra
doaj   +1 more source

D-Link Comprehensive Training Solution for Networking Professionals

open access: yesСовременные информационные технологии и IT-образование, 2020
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy