Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Server-Government'
Server-Government published presentations and documents on DocSlides.
Domain Name System ( DNS )
by myesha-ticknor
DNS is the system that provides name to address m...
SharePoint 2010 Development Platform Overview
by alexa-scheidler
Name. Title. Corporation. Agenda. What’s New in...
Hosting Day Workshop
by jane-oiler
ORK Introduction. Gang Pan. Microsoft. Introducti...
Automating System Center Deployment with the
by trish-goza
PowerShell Deployment Toolkit. Rob Willis. Princi...
Architecting a Scalable WebHosting Platform with Internet I
by conchita-marotz
Thomas Deml. Principal Program Manager. Microsoft...
Microsoft Learning
by danika-pritchard
Ignite | . May . 4 – 8. , 2015 | Chicago, IL. L...
Dissent in Numbers: Making Strong Anonymity Scale
by olivia-moreira
David Wolinsky. 1. , Henry Corrigan-Gibbs. 1. , B...
Ready to cut the ties with your old server and
by pasty-toler
start fresh? If your server is over 4 years old, ...
UAG Authentication
by briana-ranney
and Authorization- part1. By . Suraj . Singh, . S...
Authentication, Authorization, and Accounting
by test
Managing administrative infrastructure access is ...
Bare Metal OS Deployment in Microsoft System Center 2012 R2
by phoebe-click
:. This . Is How It Is Done! . Mikael Nystrom - M...
History
by liane-varnes
tracking, including browsing of an annotation's e...
Blackberry 10:
by cheryl-pisano
asked and answered. What you should know. Blackbe...
Hakuna
by trish-goza
. Matata. Brunch . February 1. st. , 2014. Dini...
Remote Procedure Call
by yoshiko-marsland
and Remote Method Invocation. INF 123 – Softwar...
DNS as a Gatekeeper: Creating Lightweight Capabilities for
by conchita-marotz
Curtis Taylor. taylorcr@ornl.gov. Craig . Shue. c...
Cloud Data Management
by luanne-stotts
Inexpensive Scalable Information Access. Many Int...
Chapter 16
by giovanna-bartolotta
Client/Server Computing. Patricia Roy. Manatee Co...
Wyatt Lloyd
by min-jolicoeur
, Michael J. Freedman. Princeton University. TROD...
DataHub
by mitsue-stanley
®. . OPC Tunneller. Overview and Demo. Cogent ...
Notes (hidden)
by pamella-moone
Embedding SQL Server Compact . In Desktop And Dev...
Interprocess
by liane-varnes
Communication. CH4. HW: . Reading messages: . ....
Consuming Web Services in Microsoft Silverlight 3
by calandra-battersby
Eugene Osovetsky. Program Manager. Microsoft Corp...
Cuckoo
by yoshiko-marsland
What can Cuckoo do?. Offload computation to the s...
Virtualization
by lindy-dunigan
Virtualization Is Everywhere. D. evelopers use it...
RAMCloud
by mitsue-stanley
Scalable High-Performance Storage Entirely in DRA...
1 Symantec De-Duplication Solutions
by tawny-fly
Complete Protection for your Information Driven E...
Jan 2014
by calandra-battersby
NetApp Manageability SDK (NMSDK) . 5.2. Technical...
Jason Collier & Jared Gradle
by phoebe-click
Premier Field Engineer. Microsoft Corporation. Ar...
Web Security
by celsa-spraggs
CS598MCC Spring 2013. Yiwei. Yang. Definition. ...
Domain Name System
by karlyn-bohler
(or Service). (DNS). . Computer Networks . ...
Securing web 2.0 applications
by stefany-barnette
through replicated execution. Ben Livshits . Micr...
Good Morning Wireless!
by ellena-manuel
SSID: . Wal_Classroom. Password. : . nepats.1. 1....
Module 12:
by alexa-scheidler
Backup and Recovery. Overview. Backup and recover...
Open
by conchita-marotz
Socrative. – Room 970781. List as many network...
Using a Load Balancer in Your Microsoft Exchange Server 201
by liane-varnes
Jaap. . Wesselius. Managing Consultant & Exc...
Should a load-balancer choose the path
by debby-jeon
as well as the server?. Nikhil Handigol. Stanford...
A Taste
by sherrill-nordquist
of Music City: A True Nashville Experience. Dinin...
Information Sharing
by pamella-moone
for. Situational Awareness and Common Operating P...
(Early) Web Security
by test
Mind The Gap. Mary Ellen Zurko (aka . Mez. ). th...
Load More...