• NGFWs such as those offered by Check Point, Dell SonicWALL, Juniper, Palo Alto Networks and others are extremely high-performance, turnkey appliances intended to stop threats before they reach a computer network and long before the anti-virus software on the individual computer even gets triggered.

    FORBES: Next-Generation Firewalls: What Makes Them Next-Gen

  • To take one example, an ObamaCare-mandated update to a major computer network called the System for Electronic Rate and Form Filing, which governs insurance approvals, has been delayed by months.

    WSJ: Review & Outlook: Hope and Exchange

  • Teledesic is a global network that aims in late 2002 to provide Internet access, video conferencing and computer network connections through 288 low- orbiting satellites to its customers no matter where in the world they are.

    FORBES: The optimist

  • In 1962, ARPA launched a nationwide effort to build a computer network called ARPA-NET.

    WHITEHOUSE: Transforming the American Economy Through Innovation

  • To prosecutors, the 26-year-old Swartz was a thief whose aims to make information available didn't excuse the illegal acts he was charged with: breaking into a wiring closet at the Massachusetts Institute of Technology and tapping into its computer network to download millions of paid-access scholarly articles, which he planned to share publicly.

    WSJ: MIT to release documents about activist Swartz

  • He addresses such questions as: May a State ever respond to a computer network attack by exercising a right of national self-defense? and: Must attacks adhere to the principle of proportionality?

    FORBES: Pace of US Cyber-Preparedness Accelerating

  • Instead, high-speed wireless access services can leapfrog the fiber lines directly to your computer and provide even higher rates of data transmission-- over the same CDMA network that's already in place to route cell phone traffic.

    FORBES: Wi-Fi's Wobbly Future

  • After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period.

    ENGADGET: Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen

  • During the investigation, Mr. Monsegur, who lived in and worked from a public-housing project in New York City, received information on a day-to-day basis of "upwards of two dozen vulnerabilities" in computer systems from a network of cybercriminals, Mr. Pastore said in court documents released Thursday.

    WSJ: FBI's 'Sabu' Hacker Was a Model Informant

  • They can also be used to transfer data, such as MP3 files, from one computer to another--or even to a home entertainment center--over a local area network.

    FORBES: Cisco's Push For VoIP

  • Once connected to your Wi-Fi network, users can watch live TV wirelessly on a portable computer or iPad, anywhere inside the house.

    ENGADGET: Elgato offers HDHomeRun TV tuner bundled with its EyeTV software for $180

  • The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.

    FORBES: VirnetX Files Infringement Case Vs. Apple With ITC

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定