12:34
Automatic Protocol Blocker for Privacy Preserving Public Auditing in Cloud Computing
For Further Details Contact K.Manjunath - 09535866270 http://www.tmksinfotech.com Contact...
published: 10 Jan 2013
7:08
Mr. Clarkson Talks About... The TCP/IP Stack
Me talking a bit about the joys of the TCP/IP stack, as part of the AQA AS Computing sylla...
published: 13 Jan 2012
4:45
Computer Networking Tutorial - 10 - What is a Protocol?
Visit my website at http://thenewboston.com for all of my videos! My Google+ - https://p...
published: 11 Dec 2012
71:32
XML11: An Abstract Windowing Protocol
Google TechTalks June 1, 2006 Arno Puder Arno Puder received his masters and Ph.D. in com...
published: 09 Oct 2007
22:38
Kerberos - Network Authentication Protocol
Steve Schneider hosts a lecture on the network authentication protocol, Kerberos. For mo...
published: 14 Feb 2012
77:50
Folklore of Network Protocols
UCL Computer Science MSc Open Day Wednesday 20 March 5pm to sign up see http://www.cs.ucl....
published: 22 Jan 2013
40:00
Towards a Theory of Trust in Networks of Humans and Computers
Jeannette M. Wing's Keynote Speech on the 14th Computing in the 21st Century Conference co...
published: 04 Feb 2013
69:35
TCP/IP and Subnet Masking
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: November 19, 2010 ...
published: 12 Dec 2010
17:59
Internet Protocol 6
The IP protocol is the most used protocol in computing. The newest version is 6 and every ...
published: 28 Jul 2011
10:59
Protocols and Computer Networks part 2
In this unit, we regard a communication network, as the means of interconnecting devices, ...
published: 01 Jul 2011
18:17
13 MobileCloud future Mobile Telecommunication Networks Using Cloud Technologies Braun
MobileCloud - Future Mobile Telecommunication Networks Using Cloud Technologies Prof. Dr. ...
published: 06 Jul 2012
30:15
QKD - BB84 Protocol - Sarah Croke - QCSYS 2011
Sarah Croke, a postdoctoral fellow at Waterloo's Perimeter Institute for Theoretical Physi...
published: 24 Nov 2011
33:10
Prof. Izhak Rubin - Mobile Ad Hoc Networking - Technion lecture
Distinguished Prof. Izhak Rubin of UCLA. Lecture: June 7, 2012. Mobile ad hoc networking m...
published: 26 Jun 2012
2:41
ICOS (Intelligent Clustered Operating Systems) Technology Overview - Scale Computing
http://scalecomputing.com/products/icos_technology/benefits/# Every Scale storage cluster...
published: 04 Feb 2011
Youtube results:
8:51
Entanglement-Based Protocols - Sarah Croke - QCSYS 2011
.Sarah Croke, a postdoctoral fellow at Waterloo's Perimeter Institute for Theoretical Phys...
published: 23 Nov 2011
53:50
How to use Spice "Open remote computing" Hansde Goede @ T-DOSE 2011, Eindhoven
Hansde Goede @ T-DOSE The place where experts meet on 5 and 6 November 2011, Eindhoven. ...
published: 06 Nov 2011
52:46
30 Cache Coherency Protocols
...
published: 02 Oct 2012
5:30
Networking protocols - animated explaination (See the working full video link in description)
http://adf.ly/96QI3 Backup & Recovery, Data Center, Data Protection, Networking & Mgmt, ...
published: 19 May 2009