Results 11 to 20 of about 366,295 (267)
La historia de la informática, y más en concreto la doméstica, ha tenido un avance espectacular en muy pocos años. Un tiempo en el que hemos pasado de mostruosos ordenadores que nacieron para ejecutar juegos en un principio, de precio astronómico y ...
Jesús Delgado Delgado
doaj +1 more source
Design and Implementation of a Voice Broadcasting System from a PC to Mobile Devices [PDF]
Mobile technology is rapidly developed, this developing leads the production of the multimedia smartphone that supports wireless LAN (WLAN) that are widely deployed because of its ease of use, flexibility, sharing application and support for multimedia ...
Omar Ibrahim, Omar AL-Saffar
doaj +1 more source
Kernel Code Integrity Protection at the Physical Address Level on RISC-V
An operating system kernel has the highest privilege in most computer systems, making its code integrity critical to the entire system’s security.
Seon Ha +3 more
doaj +1 more source
In August 2011, Linux entered its third decade. Ten years before, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to
Calvès, Christophe +5 more
core +5 more sources
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John +2 more
core +3 more sources
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj +1 more source
Analisi dell'approccio marketing open source di ...
PACE, STEFANO, LUCIANO FRATOCCHI
+6 more sources
Studying Computer Networking Technologies in School: Problems and Suggestions
Computer networking technologies are an important part of the information exchange process. In the existing basic textbooks of computer science in grades 7-11, insufficient attention is paid to this topic.
Pavel Romasevich +2 more
doaj +1 more source
Digital Forensic on Secure Digital High Capacity using DFRWS Method
As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC.
Anton Yudhana, Imam Riadi, Budi Putra
doaj +1 more source
D-Link Comprehensive Training Solution for Networking Professionals
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov +3 more
doaj +1 more source

