Searched for: "patterns mac"
- Mobility (30)
- Networking (24)
- Developer (10)
- Hardware (10)
- Enterprise Software (8)
- Apple (7)
- Microsoft (6)
- Security (6)
- Software (6)
- Cloud (5)
- Cxo (3)
- Open Source (3)
- After Hours (2)
- Big Data (2)
- Google (2)
- Storage (2)
- Android (1)
- Banking (1)
- Data Management (1)
- Printers (1)
- Smbs (1)
- Social Enterprise (1)
About 132 results for "patterns mac"
VMware continues to make progress with cloud-native computing. Find out how the company is directing its efforts.
A Refined Integrated MAC and Routing Protocol with Quantification Algorithm to Mitigate Hotspot Problems in Wireless Sensor Networks
The authors have addressed the hotspot problem in WSN and proposed a simple and efficient algorithm to mitigate the hotspot effect and to improve the overall network life-time. The...
Microsoft Excel has long been the dominant spreadsheet application standard. Erik Eckel explores the features Apple users will find in Excel 2016 for Mac.
Office 2016 for Mac, available now to Office 365 cloud users, introduces some compelling new features, suggesting Redmond still possesses some fight.
Want to keep your computer secure but don't want to fumble around with passwords? Here are five apps you can use to unlock your Mac using your iPhone.
Low power consumption in the modern VLSI circuits during testing is the main problem to be analyzed. This paper presents a Test Pattern Generator (TPG) which is a modified form of ...
Jesus Vigo reviews MacID, an iOS app that provides multi-factor authentication when accessing modern OS X-based computers.
The IEEE 802.15.4 is a new standard defined for which provides a low cost and very less complicated solution. ZigBee is the name of a specification for a suite of high level commun...
Docker is simple, but its networking is a nightmare. The Weave app uses networking under the hood to solve this frightful developer problem.
There are numerous attacks taking place at MAC layer in both wired and wireless networks at exuberant rate because this layer is very sensitive and most compromised layer in connec...