- secure communication through presence
- Сетевые технологии: шифрованная (засекреченная) связь на основе присутствия
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Extensible Messaging and Presence Protocol — (XMPP) is an open, XML inspired protocol originally aimed at near real time, extensible instant messaging (IM) and presence information (a.k.a. buddy lists), but now expanded into the broader realm of message oriented middleware. [Citation |… … Wikipedia
Business and Industry Review — ▪ 1999 Introduction Overview Annual Average Rates of Growth of Manufacturing Output, 1980 97, Table Pattern of Output, 1994 97, Table Index Numbers of Production, Employment, and Productivity in Manufacturing Industries, Table (For Annual… … Universalium
Intel Active Management Technology — (AMT) is hardware based technology for remotely managing and securing PCs out of band.] cite web |title=New Intel Based Laptops Advance All Facets of Notebook PCs|url=http://www.intel.com/pressroom/archive/releases/20080715comp… … Wikipedia
Warsaw Uprising — Warbox conflict=Warsaw Uprising partof= Operation Tempest , World War II caption=Polish Home Army positions, outlined in red, on day 4 (4 August 1944). date=1 August 2 October 1944 place=Warsaw, Poland result=German victory… … Wikipedia
Invention of radio — Great Radio Controversy redirects here. For the album by the band Tesla, see The Great Radio Controversy. Contents 1 Physics of wireless signalling 2 Theory of electromagnetism … Wikipedia
information theory — the mathematical theory concerned with the content, transmission, storage, and retrieval of information, usually in the form of messages or data, and esp. by means of computers. [1945 50] * * * ▪ mathematics Introduction a mathematical… … Universalium
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
Project 25 — (P25 or APCO 25) is a suite of standards for digital radio communications for use by federal, state/province and local public safety agencies in North America to enable them to communicate with other agencies and mutual aid response teams in… … Wikipedia
Comparison of VoIP software — VoIP software is used to conduct telephone like voice conversations across Internet Protocol (IP) based networks. VoIP stands for Voice over IP . For residential markets, VoIP phone service is often cheaper than traditional public switched… … Wikipedia
Skype — See also: Features of Skype Skype Skype 5.6 running on Windows 7 … Wikipedia