id stringlengths 40 40 | text stringlengths 0 104M |
|---|---|
415636b6ba83693b939ee69af1f5939d6d6a4350 | The following is a summary of the main enhancements that are included in OLIB 9.0 Service Pack 12. Full details of these enhancements and the other minor enhancements and bug fixes in this release are included in the OLIB 9.0 Service Pack 12 Release Notes.
Configurable Sorting
A facility has been included to configur... |
2d5cf56ce2be32acbc6065d14cd46e5ca7632823 | TECHNOLOGY & SOFTWARE CONSIDERATIONS WHEN CHOOSING YOUR PLM SOFTWARE
Whitepaper
TECHNOLOGY & SOFTWARE
CONSIDERATIONS WHEN CHOOSING YOUR
PLM SOFTWARE
Product lifecycle management (PLM) is the software that leading manufacturers use to manage and connect sales, product, production and business process data. It helps pr... |
0cefba37d3f07fd35c8dc48a9145c280173dc744 | Connect an RTMP encoder to Wowza Streaming Cloud
Originally Published on 07/14/2016 | Updated on 01/08/2020 10:41 am PST
The Wowza Streaming Cloud™ service can connect to any H.264 encoder that supports the RTMP network protocol. This article describes how to use an RTMP-based encoder as the video source for a Wowza ... |
b0358a327680203960a856b50783f87f4136427c | Trademarks
The following are trademarks of Motorola: MOTOTRBO™.
Any other brand or product names are trademarks or registered trademarks of their respective holders.
The Genesis Group Trademark Information
GW3-TRBO® is a registered trademark of GenCore Candeo, LTD., a subsidiary of Burks GenCore Co., Inc. D.B.A. Th... |
5e33471cdd87d9d1d8d5ec2aa6a92629b8e83156 | Eliminating the Backup Window
Symantec Backup Exec 12 for Windows Servers — the Off-host Backup Solution for Hitachi Simple Modular Storage 100
White Paper
By Rudy Castillo
February 2008
Eliminating the Backup Window
Symantec Backup Exec 12 for Windows Servers — the Off-host Backup Solution for Hitachi Simple Modul... |
db88ff70724b8326fa9041348da8f0e0f408bff8 | Description:
In this lab, we are going to learn Microsoft Project 2013 - a project management tool usually used to make project schedule. Specifically, we are going to learn how to create tasks (recurring tasks), summaries, WBS code, resources, and how to manage relationships between tasks. At the end of the lab, you w... |
8415b2a672ed82052d36ea7e57f58ce0f21ca74a | MIT Pharos Printing Landing Page
What is Pharos and why are we using it?
Pharos is a software package that provides "hold-and-release" printing. Normally, when you print a job, it is sent directly to the printer. Under a hold-and-release system, when you print a job, it goes into a queue where it is held until retrie... |
c0ce2dd6d4e1a16729da6c7d3536c57501d1392a | Extramural Trainee Reporting and Career Tracking (xTRACT) User Guide
Document Version 2.1.0
August 22, 2017
CONTACT US
Document Comments:
We value your feedback on this document.
How are we doing? The Communications & Documentation Team of the electronic Research Administration (eRA) is dedicated to serving our com... |
fd27a422dc441610b1db40120531d920d8dc53db | A method and system for updating or recovering a computer device's software image using a single portable operating system image stored on a bootable, secure partition on local storage (hard drive); a method and system utilizing delta image patching technology to allow the single image to work on a large number of dive... |
4345d3f52147b41cc5286683655ed96c34f2ce58 | and D in such a way that I would be a candidate for such a prize if it were actually given! More seriously, I intended these books to be useful to computer scientists for self study as well as for study in college seminars. Volume D, in particular, should make a good text for a group of advanced students.
The fifth vo... |
ab3a5236b24770d508d4487af092521d6fcc4dd6 | Phreaks, Hackers, and Trolls
The Politics of Transgression and Spectacle
E. GABRIELLA COLEMAN
Among academics, journalists, and hackers, it is common to define hackers not only by their inquisitive demeanor, the extreme joy they garner from uninterrupted hacking sprints, and the technological artifacts they create b... |
b54f606458610044352b8934ff72433f92f4a794 | Boot with GRUB
Wayne Marshall
Abstract
Especially useful for multiboot, partitioned systems, GRUB offers flexibility and convenience for startup.
GRUB: it's neither larva, fast food nor the loveliest of acronyms in the GNU herd of free software. Rather, GRUB is the GNU GRand Unified Bootloader. And, it is truly the... |
c6704cb633347fb6c395aad65709a7eaee03cd84 | Cisco Unified Communications Manager with Cisco Expressway (SIP Trunk)
Deployment Guide
Cisco Expressway X8.2
Unified CM 8.6.x, 9.x
January 2015
# Contents
<table>
<thead>
<tr>
<th>Section</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>Introduction</td>
<td>4</td>
</tr>
<tr>
<td>Deployment scenario</td>
<td>4</... |
58faf9bc7bdba2593d260bfa7a60251ba2a1ab02 | Special Track:
Artificial Intelligence and Social Semantic Collaboration
The semantic web holds promises for information organization and selective access, providing standard means for formulating and distributing metadata and ontologies. However, we miss a wide use of semantic web technologies on personal computers.... |
a0bda89d6a029edce9e38e3618dd4f352c6045ca | What Every Storage Administrator Should Do For YOUR DB2 Environment
John Iczkovits
IBM
March 15, 2012
Session Number 10475
• 10475: What Every Storage Administrator Should Do For YOUR DB2 Environment
• Storage Administrators can make or break your DB2 environment. Storage Administrators have many different options w... |
3c7754b483bea2f93b08a357192930a5630dd00b | Social Networking Sites: Commissioner Reding stresses their economic and societal importance for Europe
Viviane Reding, Commissioner for Information Society and Media, will today give a speech on Social Networking. It will be the first public statement of the Commissioner on this subject. The speech will be given at t... |
9d6a4350d492ccaef0209c826ef0c755e0d52499 | Palestine online: cyber Intifada and the construction of a virtual community 2001-2005
Aouragh, M.
Citation for published version (APA):
Chapter 5: Virtual Palestine—Online Representations
5.1 Introduction
The internet consists of the electronic infrastructures that construct interaction and information systems (Cas... |
671b47cdf4d1bf039744c2960b20e9a3fc673f5d | Virtual GPU Software R460 for VMware vSphere
Release Notes
Table of Contents
Chapter 1. Release Notes ........................................................................................................ 1
1.1. NVIDIA vGPU Software Driver Versions................................................................. ... |
d265c2261912392e52e1a5137644b82bbcdbff77 | Integrated and efficient treatment workflow gives clinicians and labs the option to connect.
Providing the best in dental treatment care is rarely a one-person show. Collaboration is often essential—and shared responsibilities can actually increase efficiency.
Nobel Biocare’s integrated and efficient treatment workfl... |
77babe0ef5c7ae2c8ed2497f214dd6aba6bd2b72 | Self-Help Guide
Zoom: Teach, Meet, and Learn with Zoom
Zoom, an online video conferencing system, is now available to the UMN community!
[Compare Zoom to Google Hangouts](#)
About this guide
This guide is for anyone who wants to use Zoom for basic teaching, meeting, and learning tasks. For more advanced topics, c... |
dd1716416c192913f54edb7840f8af6ea10d9b93 | 108 Million
Unmanaged threats to businesses, schools and government
Shadow Threat Impact
- Potential operational shutdown: 1%
- Potential Organizational Breach: 28%
- Degraded security posture: 71%
Shadow Threat Geographic Distribution
- Americas: 60%
- Europe and Middle East: 28%
- Asia Pacific: 12%
Top 3 Industry ... |
ca154da2b6804141d3f3d6355941f3918d4a662c | Town of Westwood, MA
Citizen Engagement
Prepared by: Jorge Pazos
Office of Municipal and School Technology
Executive Office of Technology Services and Security (EOTSS)
Introduction
The Town of Westwood, Massachusetts has a population of 14,618 residents. Located in Norfolk County, Westwood is situated at the junction ... |
d8dd8536be92c4676631e8b2dfdd8c070842154b | Information Note for Speakers
Tuesday, 1 December 2020, 10.00 – 12.00 pm EDT and 3.00 – 5.00 pm EDT
Thursday, 3 December 2020, 10.00 – 12.00 pm EDT and 3.00 – 5.00 pm EDT
We recommend that you join the meeting 30 minutes in advance to test your connection
Statements, Languages and Remote Simultaneous Interpretations... |
38ec80c55f3c50b17e41b1c658d65e160c5810ec | A user terminal program enables a user terminal apparatus for accepting instruction information specifying a content that a user wants to reproduce on a predetermined reproducing apparatus other than the user terminal apparatus, acquiring system identifying information to identify a system to receive the specified cont... |
0be4b55900a033ae6bf9359340e0ee798af21b16 | Sky-Writing, Or, When Man First Met Troll
STEVEN HARNAD - Steven Harnad is a professor of cognitive science at University of Southampton.
The Atlantic
MAY 25 2011, 10:54 AM
Editor’s note: Stevan Harnad wrote the following essay in 1987 while at Princeton just as the Internet we know coalesced into being. It describe... |
20a16282b6737923d97030dda042e7f09a4c1f7a | Stock Management Methods in SAP:
Some distinctive differences between IM, WM, and EWM
John Gardner
We are an SAP Service Partner and Value Added SAP reseller. We are headquartered in Chicago, and with satellite offices in New York City, Cleveland, Washington D.C., and Austin.
Our team of over 85 full-time SAP profess... |
470c59786609ec623acfccfd145c5edd38d2ef91 | SagiPlan®
The comprehensive treatment planning software (TPS) for all HDR applications including real-time prostate treatment.
One TPS for all HDR brachytherapy treatments with modern user interface and advanced planning features for an efficient and fast workflow.
Ease of Use
SagiPlan® provides an intuitive multilin... |
6e5a60ac7e3407df2ba9c9d945eb75371c127b4e | SECURITY, HACKING, THREATS & TOOLS FOR SECURITY
N. Anupama
Asst Professor
ANUCET
ANU
CONTENT
- Introduction to security
- Features of security
- Hacking
- Security threats
- Tools to provide security
- Conclusion
**SECURITY**
Security is the protection of assets.
The three main aspects are:
- Prevention
- Detectio... |
20c7f64e729d68c1e270221b61a7d30bc95d4b0b | SOCIAL MEDIA
WHAT IS SOCIAL MEDIA?
SOCIAL MEDIA'S...
PLATFORM
Web and Mobile Based.
PURPOSE
Share information and thoughts. Also builds online communities.
FEATURES
User-generated content/ personalized profiles.
WHY DIFFERENT TOOLS?
HOW DO WE CHOOSE WHICH TOOLS TO USE?
MOST USED SOCIAL MEDIA WEBSITES
INSTAGRAM
1 B... |
3f1b4f5909978fd85c21c48386180178be9a02e3 | Amadeus is a major European IT service provider for the global travel and tourism industry. When you book a flight or check into the airport, odds are that Amadeus is on the other side of that service.
These services are produced by over 15,000 Amadeus employees (6,000 of which are developers), who need an efficient d... |
563a374e494e42152e3de80a3a1b7cb742400c8a | ICANN ASO Address Council
NRO Number Council
RIPE 51
Amsterdam, October 2005
Address Council – AC
– Does not represent the RIRs directly
– Three representatives from each RIR Region
After the signature of the new MoU (Oct 21\textsuperscript{st}, 2004 - NRO), two elected and one nominated by each RIR Board
– The thr... |
32bbd0acf16c37b5cfaad40ad204dcea1439ef6c | Speculative data selfies
van der Vlist, F.N.; Helmond, A.
Citation for published version (APA):
General rights
It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the w... |
6dd1287c4748c4030545bcfa09860461a4ce944d | TABLE OF CONTENTS
Introduction ................................................................................................................ 3
Installation.................................................................................................................. 3
Accessing our portal .......................... |
b33afc4e909de647c9eadfb6164323dd5fca4ba9 | # IT INCIDENT SERVICE LEVEL AGREEMENTS
## SLAs
<table>
<thead>
<tr>
<th>Priority</th>
<th>Business Impact</th>
<th>Scope / Impact</th>
<th>Urgency</th>
<th>Resolution Time</th>
</tr>
</thead>
<tbody>
<tr>
<td>1 – Critical</td>
<td>Outage or severe degradation of a mission critical service.</td>
<td>- university wide ... |
ff05024f6af6134d180f9be0113d5e4713d57436 | How can I resolve an IP Range Overlapped error, and find the institution who owns the IP address?
Last updated: Fri, 17 Aug 2018 17:34:29 GMT
Objective
- To resolve an IP Range Overlapped Error
Applies to
- WorldCat Discovery
- WorldCat Local
Steps
This error happens when an institution already holds the IP addr... |
cadc50dfd2a60dcbe0b3db80ba3672e9972f36ad | There’s no special training or equipment needed! FreeConferenceCalling.com gives you on-demand conference calling, with 24/7 access to use anytime. You never need to notify us about your conference call; just arrange and begin when you want. Host conference calls with up to 1,000 callers per conference and use the tele... |
10662f730c328e4e4f0ff3d0c5571ff380fd9514 | GNSO
Post-Expiration Domain Name Recovery (PEDNR) drafting team
27 July 2010 at 18:30 UTC
Note: The following is the output of transcribing from an audio recording of the Post Expiration Domain Name Recovery (PEDNR) drafting team teleconference on 27 July 2010 at 18:30 UTC. Although the transcription is largely accura... |
ca02ae0caa5b303a411547c75f813852a28f51f3 | receipts and adding the contributions to your form 1040. the current invention relates to novel disintegration
a lot of times it’s challenging to get that “perfect balance” between usability and appearance.
frictionless also has quicksilver integration, which instantly moves it up a notch or two for many hardcore mac... |
a3f9eb4bdb6d147e8a71d14d205ed71b63296edc | Googling the news
Ørmen, Jacob
Published in:
Digital Journalism
DOI:
10.1080/21670811.2015.1093272
Publication date:
2016
Document Version
Early version, also known as pre-print
Citation for published version (APA):
Googling the news: Opportunities and challenges in studying news events through Google Search
Pre... |
1cb0a91fdf006af835bc9620c403ae75b66fecd5 | Ensuring remote access for work-from-home employees brought virtual private network (VPN) performance into focus at the executive level. VPN availability and performance are now the keys to sustaining business operations. The combination of remote business service access and high-quality user experience is now directly... |
81b2dc5e895815d8e33b6c76ed5b4448c4c3165b | RSA® ARCHER® ENTERPRISE MANAGEMENT
Put risks, threats, incidents and deficiencies into business context
AT-A-GLANCE
- Model your organizational hierarchy to enable enterprise governance, risk and compliance reporting at every level of your business
- Create an aggregate view of infrastructure technologies and their ... |
6ffe69e0802610dfd4f2a0ccb9c511a3cddec767 | eRA@Duke Image Retrieval Tool
Images of Approved forms and attachments
The image retrieval tool is used to view images of approved Rebudgeting/CAS Forms. As future work streams launch, you will be able to view other ERA@Duke Forms using this tool.
1. Open a web browser (Internet Explorer 9 or below, Firefox) and go t... |
a2398fe3e8493a190e77cdfb8ed9784c810a9bbb | COLORFRONT SUPPORT FOR AWS CDI UNLOCKS NEW POTENTIAL FOR CLOUD-BASED VISUAL EFFECTS AND CONTENT CREATION
Los Angeles, CA, USA – December 7, 2022 – Colorfront (colorfront.com) – the multi-award-winning developer of high-performance dailies/transcoding/streaming systems for motion pictures, OTT and commercials – continu... |
4e1ca6684f7c4b1832f6ba16a1356ff53e709d21 | Following the Money:
How Advertising Dollars Encourage Nuisance and Harmful Adware
and What Can be Done to Reverse the Trend
A Report by the Center for Democracy and Technology
May 2 2006 (Update)
Unwanted advertising software or "adware" has evolved from an annoyance into a serious threat to the future of Internet ... |
7ac7d952dc1ace1bc23ef3dc8a541aded25ec010 | When setting up OpenAthens for ILLiad, do we set it up as an LDAP or a RemoteAuth connection?
Symptom
- You are setting up OpenAthens for ILLiad and you want to know if you should be using LDAP or RemoteAuth Authentication
Applies to
- ILLiad
Resolution
2. If you are using Shibboleth and you are Self-hosted, Atl... |
57768362df860d53e363086c92a33de398a004b5 | Trash
Burkhard Lück
Trash
Trash
Contents
This module allows you to configure the settings for the trash.
**Cleanup**
- Check this box to allow automatic deletion of files that are older than the value specified. Leave this disabled to not automatically delete any items after a certain timespan. Set the number of day... |
5056f7957fc841118438f1b33534c0b8d55f51b5 | HA User Manual for the Development Sub-Module of IMS/PIC
Public and Indian Housing (PIH)
Real Estate Assessment Center (REAC)
Inventory Management System (IMS/PIC)
U.S. Department of Housing and Urban Development (HUD)
Prepared by: Quality Software Services, Inc
Shiva Information Technology Services
# TABLE OF CONTE... |
d9a3a4508a7fac349d4db022a09606fcc8ace4e4 | Software security: site licensing, 'boxtops,' and other strategies
As the issue of software piracy gains recognition, program manufacturers are trying different ways to protect their software from illegal copying.
Some companies are trying site-licensing agreements, which permit users to freely make copies for use at... |
13adce15df20f7022181e28f7026294b905ee38a | ## Contents
**Welcome** .......................................................... 1
- What’s new in Corel PaintShop Pro 2019 .......................... 1
- Installing and uninstalling Corel programs .......................... 3
- Starting and exiting the program .................................... 4
- Regi... |
030623a500413307c845368ad5ed26a2a3d35a0d | Why do some of my compound objects appear with a scroll bar while others make you click through the pages?
**Symptom**
- You've set up a compound object in a CONTENTdm collection, but it doesn't appear like other titles in your collection. Instead of showing a scroll bar where users can scroll through all the pages, ... |
67ea3b5eed29a7344cf5d76a5f1dbbc6e8f8d79b | REDCap User Policies
Research Solutions hosts the REDCap application on both Development and Production servers. The Development server is provided as a means to “try out” the software, develop data entry forms, and train new users. Any user can create databases on the Development server. Collection of real data is no... |
8f3e3cbaf39e44c1a4536484c9831254c1c2aebd | Citing a Blog from a Website in *NoodleTools*
Blog components:
- Dated "posts" usually in reverse chronological order
- May contain "blog" in the title
- May be created using a blog service such as Blogger or WordPress (seen in URL).
Click the info button for help in analyzing the source citation
Under Sources, Click... |
759954872ee5c012a6aae80c9c2b36f77614222e | TTI employees who would like guidance or assistance in making deliverable documents accessible can contact Rhonda Brinkmann or Michelle Benoit for more information. For assistance with accessibility for media deliverables such as videos and interactive files, contact Mark Coppock.
Overview
Accessibility is making ele... |
dfc273b5f33f511d53a6b31aba73d47155d65714 | SITeseer is a Web-page recommendation system that uses an individual's bookmarks and the organization of bookmarks within folders for predicting and recommending relevant pages. Siteseer utilizes each user's bookmarks as an implicit declaration of interest in the underlying content, and the user's grouping behavior (su... |
0032ad5c606476de92a60214f192ac2e2bcfb153 | Chapter 3.15
Using Virtual Worlds to Assist Distributed Teams
Clint Bowers
University of Central Florida, USA
Peter A. Smith
University of Central Florida, USA
Jan Cannon-Bowers
University of Central Florida, USA
Denise Nicholson
University of Central Florida, USA
ABSTRACT
Virtual worlds and massively multiplayer... |
0528824bde2edc87bf929b1173997e9d8877b6a1 | Self-Help Guide
Enterprise CRM
This Self-Help Guide may change as more users onboard to the Enterprise CRM platform. Instructions provided are intended to assist in explaining and navigating the current functionality but we'd like it to evolve to fit your needs! Use the Feedback option at the bottom of this page or a... |
b7d3f8dee3e086c2d92841154dcf678e523ae5c3 | In a previous paper (Roche, Stewart, & Barnes-Holmes, 1999), the graphic experiment generation software PsyScope (Cohen, MacWhinney, Flatt, & Provost, 1993) was reviewed and its relevance to behavioral research in the domain of language and cognition was outlined. Many behavioral researchers have since explored the pot... |
9d06b888b2bad7a116f16b0cd960c597969b54bc | Frequently Asked Questions (FAQ)
REV Aug. 2016
Single Enterprise Clinical Trial Management System (CTMS)
1. What is the Clinical and Translational Science Award (CTSA) and how does it relate to the University of Minnesota?
The CTSA program at the National Institutes of Health supports a national consortium of medica... |
cff777c9d1a8e745647e9f17e97e4963e511c85c | Hotspots
And Rural Libraries
About JMRL
8 branches + bookmobile + historical society
4 counties + 1 city
Serve 200,000 people
Both urban and rural populations
From the Virginia Department of Health
Virginia Centers for Medicare and Medicaid Services (CMS) Low Population Density Rural Zip Codes*
* CMS desiganted ... |
3210ad224307114d2ffadc4a018dff0ae93e6222 | For ILL Requests that come in during the end of year, which month are they listed under in Usage Statistics?
Last updated: Wed, 03 Aug 2022 19:16:10 GMT
Applies to
- WorldShare Interlibrary Loan
- Tipasa
Answer
It depends which reports you are referring to. If it's the Resource Sharing Statistics, then OCLC is goi... |
e6e00280c4d26e4cd609d2b01e2f8560eb8f1123 | Tips for Creating a Password
Making a password that is strong and easy to remember is hard!
Follow these steps to make sure that you have strong passwords and that you never forget them when you need them!
Creating a Strong Password:
● Make your password at least 8 characters long
● Include capital and lowercase lett... |
88d8c2c32248c917396c674b5d94ab80c586e222 | SLAC Confluence Home
This is the home page for Confluence at SLAC
Usage of this system is subject to SLAC's Acceptable Use Policy.
SLAC employees and users with a Windows or UNIX account can proceed to sign in here
- If you do not have a SLAC Windows or UNIX account and do not plan to obtain one, you can request a ... |
f7d7f9378435f354280ac0d280814e92cd6a9932 | Oracle Exadata Cloud Service X8M
Delivering Top-Tier Elasticity and Non-Disruptive Upgrades to the Enterprise
It’s not an exaggeration to say that IT organizations across nearly every business segment suffer from an overabundance of data. Although data has become an essential basis of competitive differentiation, org... |
4f0bd7a41b12f9eafdf8dddf0a7322cbb905f3c3 | Conference report
Online Information 2001 – The 25th International Online Information Meeting (IOLIM)
3–7 December 2001, London, UK
The Online Information 2001, which new name – probably – reflects the changes we have seen in the (online) information industry. It was a jubilee conference, the 25th International Onli... |
1b01230ca05dcd6764a41bfeb56110438b7a86e6 | How To Process Tables in Transkribus
This is a short introduction to marking up and exporting tables as well as to the semi-automatic table processing using Transkribus and nomacs. Segmenting printed or hand-drawn tables using the Table Editor in Transkribus will add graphical lines into your image and assign a tabula... |
ff1dd452e71a7ea36491b1c5d8e6537d1c6d3643 | Motivation
Can differential privacy be adapted to different privacy requirements?
Can we use differential privacy on secrets that are not databases?
Outline
- Generalization of differential privacy
- Privacy in the context of statistical databases
- Privacy in location-based systems
Differential Privacy, adjacent da... |
68bd2f486a4a905cf70e77985857f57361d6fab6 | Legal Notices
Disclaimer
Certain versions of software and/or documents ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any r... |
aba4190c0fee41d8e2c347031f00d6882872770e | Start from the Question—A Guide to Unstructured Text Analysis
Seth Redmore
Abstract
Text is one of the most important modes of human communication. To truly listen to your customers, partners, competitors, and employees, you must be able to understand the text they’re exchanging with you and among themselves.
The s... |
26ba1b18d456af0043a899a54aa775fe2b9b17a0 | User Manual for the Dismounted Infantry Virtual After Action Review System (DIVAARS)
Bryan R. Clark
University of Central Florida
Consortium Research Fellows Program
Donald R. Lampton
U.S. Army Research Institute
Glenn A. Martin
University of Central Florida Institute for Simulation and Training
James P. Bliss
Old ... |
85c37f0f7dfffaf33a6d229329ff692bed817e32 | Global Information Assurance Certification Paper
Copyright SANS Institute
Author Retains Full Rights
This paper is taken from the GIAC directory of certified professionals. Reposting is not permitted without express written permission.
Interested in learning more?
Check out the list of upcoming events offering "Impl... |
019a061b71358c79f07d49802757378d88641faf | How Do I Change the Screen Resolution?
The following instructions outline how to change the screen resolution for both a Windows PC and a Macintosh running OSX.
**Windows XP**
1. Minimize all open windows by clicking the **Show Desktop** button on the Quick Launch bar.

NOTE: If ... |
8c8c674f2b85d1815ea8c976e00a76ca1f09b4bf | Introducing IBM Tivoli Configuration Manager
Version 4.2
Introducing IBM Tivoli Configuration Manager
Version 4.2
Note
Before using this information and the product it supports, read the information in "Notices" on page 31.
ISO 9001 Certification
This product was developed using an ISO 9001 certified quality syste... |
2280321ae70144fb5e6ab8dd957ed1b7bd3266fc | darktable 3.8 user manual
# Table of Contents
1. Overview 6
1.1. user interface 6
1.1.1. views 6
1.1.2. screen layout 6
1.1.3. filmstrip 8
1.1.4. top panel 8
1.1.5. keyboard shortcuts 8
1.2. supported file formats 9
1.3. sidecar files & non-destructive editing 10 ... |
dcc91da410fc832f5023500386d29773f74e12d4 | Requesting a Confluence Account for a Collaborator without a Cornell NetID
Confluence pages can be made visible to the world at large; however, if you find that you need to restrict the visibility of your content and would like to allow a small number of collaborators who do not hold a Cornell NetID the ability to add... |
80e623a06a9017ab9d4510a00817ff6b58b65374 | How to Clear Cache from Your Browser
Cache files are files that are stored on your browser to help web pages load or work faster. If a web page has a photo that never changes, your browser can place it in cache so that it does not need to load every time you go to the page. Unfortunately, sometimes pages that do not l... |
816345ade091d1d9489d27e73130499665ae1452 | How Can I Ensure Our Network Delivers a Reliable User Experience?
With CA Spectrum®, you can monitor the backbone of your application innovation and user experience—the network that delivers your business-critical applications and services—and provide your business the high performance and availability it requires for ... |
272d57e644d6de2ec70718ebe19a261b32554d34 | It’s Tough Keeping Pace with Today’s Cyberattackers
Cyberattacks are rapidly evolving. It is more critical than ever that your company be protected by the latest innovations in endpoint security. And if you’re dealing with outdated antivirus solutions, your risk of experiencing damaging attacks is increasing exponenti... |
d7fe7f557c9dfe44b4cecd1721e53fa09ee5ff10 | Drupal Support
Search by Keyword
- Browse by Category
- Browse by Complexity
By Category
Login
To manage any part of your web site, you will have to be logged into the Drupal CMS.
If you need help logging in, please review this login help document.
Contact the Franklin OIT Help Desk
Submit a ticket
Help Desk
htt... |
6cbdbf75d0445ba3113b05c9c22976463673e25d | Record Slide Show Narration and Timings
Slide narration and timings can enhance a Web-based or self-running slide show. When creating a video with the presentation, using narrations is a great way to make it less static. Audio narration can be used to archive a meeting so that presenters or absentees can review the pr... |
ac09247f6e72a2eb39376fccc3dc0f0184be41fb | 1. Present / apologies
Attendees:
Jaap Akkerhuis, ISO
Martin Boyle, .uk
Becky Burr, NomCom
Keith Davidson, .nz (Chair)
Steven Deerhake, .as
Chris Disspain, .au
Dejan Djukic, .rs
Vernita Harris, USG - GAC
Eberhard Lisse, .na
Desiree Miloshevic, .gi
Paulos Nyirenda, .mw
Nigel Roberts, .gg
Bill Semich, .nu
ICANN staff:... |
5072adaf16211b63c10a9715cf68ab89ae39c4c1 | Internet Corporation for Assigned Names and Numbers
Louis Touton
Presentation to the FTAA Joint Public-Private Sector Committee of Experts on the Internet Corporation for Assigned Names and Numbers
14 June 1999
Background
Origins of the Internet
- Research oriented
- US Government funded
- DARPA
- NSF
- Governm... |
a9b21e4ad19466a0d3e8a4a88b320d284945542e | Flickr SEO Tip Sheet
Feinberg Office of Communications
You’ve just edited all your photos and are ready to post them to Flickr. Here’s how to optimize your Flickr photoset to drive traffic to your website.
1. **Do keyword research.** [Google Keyword Tool](https://adwords.google.com) is a great resource for generating... |
0a02ab956bb2ab385327d23386cb089c689d8f68 | DDoS Mitigation
Powerful, real-time DDoS mitigation
DDoS attacks growing in size
Distributed denial of service (DDoS) attacks are getting bigger and more disruptive. These attacks can outstrip aggregate bandwidth and computing resources of any data center serving critical users. With the increasing size of the avera... |
4753f571bc86519948d8c497a74e51905b527789 | MIT Dropbox Landing Page
Overview
Dropbox is a cloud-storage company founded by two MIT students. IS&T has licensed the Dropbox for Business service for the entire MIT community. Dropbox for Business provides the MIT community with large storage capacity and convenient access to data via Windows, MacOS, Linux and mob... |
27c5eda1cd84be3a6f137c4c7ecfedd8018d3bae | THE DEFINITIVE GUIDE TO
Desktop-as-a-Service
What This Book Covers
Digital workspaces are rapidly replacing physical desktops and laptops in many work environments. These workspaces may be delivered by virtual desktop infrastructure (VDI) running in your datacenter, but companies of all sizes are increasingly turning ... |
45b510ddd8cce95b80479a3998b968715b3c257d | Adding members to a Wiggio group
- Adding a D2L class to a Wiggio group
- Adding Wiggio contacts to a group
---
**End-of-Life Warning**
The D2L company will shut Wiggio down permanently before the end of February 2020.
If you have used Wiggio, please immediately:
- Export from Wiggio any materials you wish to kee... |
38a6ae257db4f2c1318f5b9d523167d9026e2574 | Kite Student Portal is used by students who take Dynamic Learning Maps® (DLM®) Alternate Assessments and is available for use on either a managed or an unmanaged Chromebook. When installed, the app runs in kiosk mode. When running, Kite Student Portal covers the full screen of the hardware, preventing students from acc... |
46a03fc64ffbe7763b6a0f613fb410fbf987ef59 | Security Survey 2022
We have conducted our annual survey, which helps us to improve our service to the end-user community. Respondents were asked for their opinions on various topics related to anti-virus software testing and anti-virus software in general. We would like to thank everyone who took the time to complete... |
e6343dc447244e7f47ade727e131fd10936320b2 | Appendix A: Internet Primer
This primer is a supplemental reference guide designed to get you up and running on the Internet. The Internet, generally referred to as the “Net,” encompasses many different methods of manipulating information and communicating, including the World Wide Web (WWW), electronic mail, instant ... |
e91fa5d790ba2c386e5ba20cb1fbb573a4d4d9c8 | FAQ
Citrix NetScaler and Kubernetes Integration
What's new?
You can now use NetScaler CPX as an Ingress controller in Kubernetes clusters to load balance the north-south traffic to your Kubernetes services from clients outside the Kubernetes cluster. This is in addition to the previously announced capability of NetSca... |
bdd8081e493c486bf592f9a579ef956fb35b2973 | Course-to-Course Navigation
Course to course navigation
Course-to-course navigation allows students and instructors to jump from course to course while retaining the context of the page or task from the original page or any recently accessed course.
To switch to another course that you are enrolled in or are teachin... |
dee100ccf2349c11bda1e617da40eb92b6ee3514 | Task Switcher
Martin Gräßlin
Task Switcher
## Contents
1 Navigating through Windows 4
1.1 Visualization 4
1.2 Shortcuts 5
1.3 Content 5
1.4 Filter Windows By 5
1 Navigating through Windows
The Task Switcher allows the user to easily switch between currently open windows using the keyboa... |
e413eb8314f7caeaee629fb4932202bbaa0a4380 | # Contents
<table>
<thead>
<tr>
<th>Topic</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>Introduction to NetBackup SaaS Protection</td>
<td>3</td>
</tr>
<tr>
<td>NetBackup SaaS Protection Security Fundamentals</td>
<td>3</td>
</tr>
<tr>
<td>Application Security</td>
<td>5</td>
</tr>
<tr>
<td>Identity Awareness</td... |
35f4559cd5495f2d86b03077118b45e082394c60 | System Center Operations Manager 2007
Data Warehouse and ACS Database Reporting and Archiving
**ECC eSCOP Functional Challenge ...**
**eSCOP ACS COMPLIANCE REPORTING**
Over 250 Pre-Defined Reports through consolidated reporting dashboard console for Sarbanes Oxley, HIPAA, GLBA, PCI, FISMA and other regulatory compli... |
992d402a2deff57855444ac41d118cab3394191f | PRODUCT: BROADBAND COMMAND CENTER
NETWORK AGNOSTIC DEVICE PROVISIONING
RELIABLY PROVISION RESIDENTIAL AND BUSINESS OFFERINGS ACROSS MULTIPLE ACCESS NETWORKS
PRODUCT HIGHLIGHTS:
1. Multiple standard support: DOCSIS, PacketCable, SIP, IPv4, and IPv6
2. High availability to prevent delays and assure revenue
3. Network... |
f85bbb1fa5cbf55dd7c392945870775a6e6bdeb2 | Introduction
The Data protection Code of Conduct v2 describes an approach to meet the requirements of the EU GDPR in federated identity management. The Data protection Code of Conduct defines behavioral rules for Service Providers which want to receive user attributes from the Identity Providers managed by the Home Or... |
4b1e777dd53b32cade46cad045d172e46e76f77f | Case Management Overview ...................................................... 1
Setup ......................................................................................... 2
Customizing Fields ................................................................. 2
Customizing Case Page Layouts ......................... |
2ddd8cc1a0d9b7c151ccfe34a0341c69e2be3a9e | Client Enrichment Series
Special Event
**Entering RWAs into GSA’s eRETA System**
the presentation will start at **1:00 PM Eastern**
**Note:** Phones are automatically muted during the presentation. You have the ability to send questions to the host and presenters through your “Chat” pane. Our Subject Matter Experts ... |
75c928e317b961611dc5b0426cb919710c438335 | ¡COLABRORATE WITH ORUXMAPS!
You can help the project:
Donate using Paypal
Download OruxMaps Donate
WORKING WITH THE MANUALS
It is an easy task if we do it between all.
Español
English
***NEEDS A LOT OF HELP***
<table>
<thead>
<tr>
<th>Topic</th>
<th>Page</th>
</tr>
</thead>
<tbody>
<tr>
<td>QUICK START</td>
<td... |
7e1a082948871746bb42be1ae48e450e7954a0ba | Step-by-Step Guide to Ansur Executive 3.0
*With or without Electronic Signatures*
# Table of Contents
- Background .......................................................................................................................... 3
- Set up Central PC: ............................................................ |