proactive computing

  • 31Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …

    Wikipedia

  • 32Rensselaer Polytechnic Institute — Infobox University name = Rensselaer Polytechnic Institute motto = Knowledge and Thoroughness established = 1824 type = Private president = Shirley Ann Jackson provost = Robert Palazzo [cite web|url=http://news.rpi.edu/update.do?artcenterkey=2203|… …

    Wikipedia

  • 33Instruction set — An instruction set, or instruction set architecture (ISA), is the part of the computer architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception… …

    Wikipedia

  • 34Content delivery network — A content delivery network or content distribution network (CDN) is a system of computers containing copies of data placed at various nodes of a network. When properly designed and implemented, a CDN can improve access to the data it caches by… …

    Wikipedia

  • 35List of buzzwords — This is a list of common buzzwords which form part of the business jargon of Corporate work environments. General conversation * Alignment * At the end of the day * Break through the clutter [http://www.columbusalive.com/?sec=services… …

    Wikipedia

  • 36Symantec — Corporation Type Public (NASDAQ: SYMC) Industry Computer software …

    Wikipedia

  • 37Self-management (computer science) — Self Management is the process by which computer systems shall manage their own operation without human intervention. Self Management technologies are expected to pervade the next generation of network management systems.The growing complexity of …

    Wikipedia

  • 38MicroStrategy — Type Public (NASDAQ: MSTR) Industry Business intelligence Founded …

    Wikipedia

  • 39IBM Tivoli Unified Process (ITUP) — is a knowledge base of widely accepted industry best practices and the accumulated experience from IBM s client engagements. The knowledge base is comprised of detailed, industry wide IT service management processes, and is an integral part of… …

    Wikipedia

  • 40JXMobile — Pair à pair Pour les articles homonymes, voir P2P (homonymie). Le pair à pair (traduction de l anglicisme peer to peer, souvent abrégé « P2P »), est un modèle de réseau informatique. Il s oppose au modèle client serveur. Le partage de… …

    Wikipédia en Français