brief protocol

  • 1protocol — pro·to·col / prō tə ˌkȯl/ n 1: an original draft, minute, or record of a document or transaction 2 a: a preliminary memorandum often formulated and signed by diplomatic negotiators as a basis for a final convention or treaty b: the records or… …

    Law dictionary

  • 2protocol — /prowtakol/ A brief summary of the text of a document. Also, the minutes of a meeting which are generally initialed by the parties present to reflect their assent to the accuracy of the minutes. A section of the Department of State charged with… …

    Black's law dictionary

  • 3E-Brief — Verfassen einer E Mail in Sylpheed Die (auch das) E Mail [ˈiːmeɪl] (kurz Mail; von englisch: „electronic mail“; zu Deutsch: „die elektronische Post“ oder „der elektronische Brief“) bezeichnet eine auf elektronischem Weg in Computernetzwerken… …

    Deutsch Wikipedia

  • 4Wireless Application Protocol — Not to be confused with Wireless access point. Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones (called… …

    Wikipedia

  • 5Kyoto Protocol — Participation in the Kyoto Protocol, as of December 2010, Green = Countries that have signed and ratified the treaty              (Annex I II countries in dark green) Grey =… …

    Wikipedia

  • 6Montreal Protocol — For other similarly named agreements, see Montreal Convention (disambiguation). The largest Antarctic ozone hole recorded as of September 2006 The Montreal Protocol on Substances That Deplete the Ozone Layer (a protocol to the Vienna Convention… …

    Wikipedia

  • 7File Transfer Protocol — (FTP) is a network protocol used to transfer data from one computer to another through a network such as the Internet.FTP is a file transfer protocol for exchanging and manipulating files over a TCP computer network. A FTP client may connect to a …

    Wikipedia

  • 8Network Time Protocol — The Network Time Protocol (NTP) is a protocol and software implementation for synchronizing the clocks of computer systems over packet switched, variable latency data networks. Originally designed by David L. Mills of the University of Delaware… …

    Wikipedia

  • 9Layer 2 Tunneling Protocol — In computer networking, the Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). History and future Published in 1999 as proposed standard RFC 2661, L2TP has its origins primarily in two older …

    Wikipedia

  • 10Interlock protocol — The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an …

    Wikipedia