Sentences with phrase «between users on the network»

Dash is also designed to allow faster transactions between users on the network.

Not exact matches

The social network on Monday released data it collected between August 5 and 21 about its users» Olympics - related activities.
Since users often switch between browsers, apps and devices, Adroll features cross-platform retargeting, catching users on social networks, news sites and search networks, both on their desktops and on their mobile devices.
Viber added end - to - end encryption to protect all conversations between individual users and groups on its network.
While both ether and bitcoin are cryptocurrencies and can be traded, exchanged, and transacted between users, ether is largely used to pay for services and transaction fees on the network — enabling the development and distribution of applications — while bitcoin is used more closely to an actual currency and alternative therein.
Between these two consensus mechanisms, SolarCoin has a 2 % annual inflation rate, and the supply awarded to Proof - of - Generation users on the network is projected to run out after about forty years.
The technology underpinning bitcoin, however, operates using a decentralised payment system, which means that a payment between two parties is direct and relies on reliable copies of the ledger being distributed to a vast network of bitcoin users around the world, who can verify any changes.
T - Mobile believes that it will have most of the traffic share under Project Fi, which will allow users to move between Wi - Fi networks and cellular networks depending on which one is the fastest.
«We are seeing strong interest in using the FLO TV network or spectrum to capitalize on the growing imbalance between mobile data supply and demand, the growth of tablets, and consumer demand for high quality video and print content, and a richer user experience,» a statement reads on FLO TV's Web site.
Demonstrating once again the shallow loyalty of online associations, as well as the vast difference between hosting and controlling a social network, Amazon was also reminded that even though it is (or rather was; more on this in a moment) one of the publishing industry's biggest wholesale customers, from the point of view of the end user it's just another easily replaced retailer.
Plans are under way where users of either carrier can automatically switch between the phone networks mid-call, on to whichever network has the strongest signal.
The tipo dual features a dedicated SIM switch key which allows users to alternate between using either of the network operator cards on the phone at any given time with relative ease.
The app, which allows users to create six - second video clips for sharing on social networks, is also reportedly going to include the ability to tag friends to a clip, in order to foster more sharing between users.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
I think the people with high bandwidth connections that are having major problems with these issues are either playing over WiFi on their home networks (which ANY online gamer will tell you is a bad idea and not only from a networking point, but also in terms of controllers) and / or they have a «bad apple» gateway between their internet service provider and Sony's PSNow servers (this is completely out of the user's control and partially out of Sony's control — at least for the Beta).
Players can also test how their skills stack up online against one another via network play, with full cross-play compatibility on offer between PS4 ™ and PS3 ™ system users.
Players can also check out how their skills stack up online against other network players, with full cross-play on offer between PlayStation ® 4 system and PlayStation ® 3 system users.
Once players master the basics, they can see how their skills stack up online against other network players, with full cross-play on offer between PlayStation ® 4 and PlayStation ® 3 users.
The main social component of the platform involves users making «connections» between channels, or taking existing information on the network and connecting that block to another channel.
If there is a dispute between participants on this site, or between users and any third party, you understand and agree that The Freecycle Network is under no obligation to become involved.
«P2P networks are mere conduits for the transmission of data between Internet users, and on this basis they do not infringe rights protected by Intellectual Property laws,» he declared.
Dubbed Wi - Fi Assistant, this feature is that which helps users of Project Fi save more data by switching between open Wi - Fi networks and cellular data and in the process helps with data saving for those who depend a lot on cellular data.
The venture - backed firm is best known for iterating on top of the open - source bitcoin protocol with projects such as the Lightning Network and sidechains, the latter of which aims to allow users to send assets back and forth between blockchains «pegged» to bitcoin.
Elsewhere, Lightning white paper author Tadge Dryja gave a talk on Discreet Log Contracts, work that hints at how so - called oracles, or third - party data providers, could operate within Lightning Networks, settling conditional payments between users such as might be wanted for insurance payments or casual betting.
Users can easily share content between their All - In - One and other Samsung devices on the same network.
The addition of replay protection is intended to prevent users from sending both bitcoin gold and bitcoin when making a transaction meant to occur on just one chain — a necessity owing to the shared code between those two networks.
Because there is always a considerable lag - time between records being updated in the banking and credit card network, users started seeing odd deductions on their accounts.
Although still in its nascent stage, the Lightning Network - based on a recent white paper - aims to solve the scalability issue by implementing hashed timelock contracts between users.
«Right now people are kicking the tires, in terms of user testing and having spending between each other,» Dryja said, adding that such experimentation is ongoing on Testnet3, an alternative blockchain that replicates network conditions without using real bitcoins.
Once the Stellar - based Kin token has been released and fully - initialized — which will occur later this year — users will be able to move their tokens between networks by locking them up on one and unlocking them on the other, presumably through a smart contract mechanism.
Information Technology (IT) Director — Duties & Responsibilities Manage IT department, customer service technicians, client / staff training, and a multimillion dollar budget Set and strictly adhere to departmental budgets and timelines ensuring timely and cost effective operations Responsible for 150 servers in a VM / SAN environment, Cisco network, and MAN connection between offices Maintain 4 9's uptime on all IT services and attain 100 % SLA compliance with clarification of SOW terms Successfully manage multiple building moves and build outs with zero IT downtime Oversee PBX to Cisco Unified Communications change, VMWare / SAN implementation, and hosting of 20 ASP clients Create and implement complete helpdesk department and remote resolution of client issues Negotiate and administer contracts and partnerships with vendors, service providers, and other parties Configure, troubleshoot, and support 300 + corporate workstations ensuring efficient, effective, and secure operations Oversee remote network access, VPN support, and phone support for remote executives Install, configure, troubleshoot, and support multiple Windows and SQL servers Design and implement enterprise disaster recovery systems, processes, and policies Plan and develop of LAN / WAN hardware and software requirements, updates, and related equipment Facilitate customer contracts / billing, technical support, and end - user training Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Collaborate with department managers to identify and address security concerns through IT Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
City Group (New York, NY) 1995 — 1997 Consultant — Unix Administrator • Senior System Administrator in for Solaris and Aix environment and application development area • Systems included Sun Ultra Enterprise 450, 420R, 4500, and 6500 running on Solaris 2.5.1, 2.6 and Aix 4.3.2 • Development environment composed of mostly Sun equipment including Sun StorEdge A5200, A5100, D1000 arrays using Veritas and SDS volume managers • Backed up systems with Legato Networker using BoxHill, Qualstar, and Sun StorEdge L9 tape stackers • Utilized Jrun, WebSphere, WebLogic, Actuate Report Server, iPlanet, and Netscape Enterprise • Senior Unix SA solely responsible for the application development area supporting Solaris, Aix and Linux platform • Performed massive installation of Solaris servers using Jumpstart to global distributed network • Installed new and trial software, maintained server stability, backed up system using Legato Networker, debugged system problems such as network connectivity, and packaged developers» software released to production • Project work involved getting specification from users, recommending appropriate system, submitting purchase order to purchasing, ensuring arrival of new system, building the system to Sotheby's standard, and installing necessary software for the user • Built and configured IBM and Sun servers installing Aix 4.0 and Solar 2.5 - 2.6 operating system and Oracle 7 • Performed backup and Recovery using ADSM and Tape backup • Automated disk monitoring and routine tasks utilizing Bourne Shell scripting and cronjobs • Served as liaison between vendors on resolving hardware and software issues • Monitored servers using Tivoli Storage Software • Trained and mentored Junior systems Administrators and operators
Regional IT Manager • Manage HQ infrastructure team and Asia information technology team, leading 11 staff in the servicing of over 800 users and 9 offices with responsibility for global infrastructure architecture and global network and focus groups • Drive global standardization firm - wide within networks, storage, backup, servers, computers and other critical hardware • Utilize cross-regional focus groups to connect functional experts between sites, establishing roadmaps, creating annual project plans and delivering global projects • Define incident management and change management processes, working with application teams for full implementation • Create datacenter in ShenZhen technology center to support ASIC team, software team, firmware team, hardware team and sales and FAE teams • Manage high volume of acquisitions and IT integrations on a global scale, including the CSR integration preparation (2011), the Microtune integration (2010), the Letitwave integration in France (2008) and the Emblaze Semiconductor in Israel (2004) • Supervise and lead numerous technology refresh projects including the global Exchange 2010 upgrade, the global MPLS network upgrade, the network switch upgrade, a global firewall project and internet bandwidth upgrade • Execute critical operations functions and projects including global wireless technology management, network monitoring, the global SSL VPN project, the management of Microsoft licenses and the e-mail gateway • Support critical business continuity tasks, including the development of a low - cost Oracle ERP system DR solution, server virtualization, E-mail DR and Perforce DR • Lead cost - saving and expense management endeavors including the build - up of a Quintum VoIP gateway globally to utilize traditional PBX gateway and the build - up of near - line archive storage with de-duplication technologic
Globeop Financial Services, LLC (Harrison, NY) 2005 — 2007 Manager Enterprise Infrastructures Group • Designed and implemented disaster recovery system for Reuiter's Kondor 3.0 on Solaris 10 and Sybase 12.0 — 15.0 • Installed, configured, and managed Reuiter's Kondor 3.0; Solaris 10 (LDOMS, ZFS, RAID, ZOANS, CONTAINERS); AIX 4.3 - 5.3, Red Hat Enterprise — RHEL 3.0 — 4.0, Sybase 12.0 — 15.0, Oracle 10g, MYSQL 2.7.1, Sun One Directory Server (LDAP), SUN IDM, Solstice Disk Suite, Sun Cluster 3.0 - 3.2, Veritas Storage Foundation 4.1 — 5.0, Veritas Cluster Server, Veritas NetBackup 5.0 — 7.0, Storage Array A1000 — A3500, EMC SAN, HITACHI SAN, 3 PAR, Brocade switch 40K, Cisco switch 6309, SSH, SSL, RSA encryption, Emulex LPFC, NaviSphere, EMC, and Power path • Automated processes utilizing shell scripts (Bourne, Korn, C Shell, Bash, AWK, SED and Perl) • Strong technical expertise in all major server technologies (SUN / HP / IBM / Linux / Microsoft) experiment in managing mission critical, low latency, high availability and clustered IT systems and familiar with FIX protocol • Performed massive installation of Solaris servers using both Jumpstart and Blade Logic and Red Hat using both PXE boot and BladeLogic servers to global distributed network of more than 2500 servers • Conducted disaster recovery tests • Managed and supervised four technicians ensuring continuity of service and efficient operations • Coordinated effort among Development, System, Networking, Application Support, Backup and recovery team to ensure maximum up time and effective issue resolution • Planned & developed projects, performed user acceptance tests, and applied patches to repair bugs • Developed shell scripts for Bourne shell, Korn shell, C Shell, AWK, PL / SQL and PERL • Managed DNS, NIS, NIS +, LDAP, jump start, Send Mail, SFTP, FTP, HTTP, SSL, SSH, Telnet and HP Open View • Coordinated effort between Development, QA, Production, DR, Systems, DBA, Production Support and Network Administration, Applications group for project completion ahead of time and under budget • Managed DNS, NIS, NIS +, DHCP, LDAP, SFTP, jumpstart, Apache, Tomcat, Websphrer and HP Openetwork of more than 2500 servers • Conducted disaster recovery tests • Managed and supervised four technicians ensuring continuity of service and efficient operations • Coordinated effort among Development, System, Networking, Application Support, Backup and recovery team to ensure maximum up time and effective issue resolution • Planned & developed projects, performed user acceptance tests, and applied patches to repair bugs • Developed shell scripts for Bourne shell, Korn shell, C Shell, AWK, PL / SQL and PERL • Managed DNS, NIS, NIS +, LDAP, jump start, Send Mail, SFTP, FTP, HTTP, SSL, SSH, Telnet and HP Open View • Coordinated effort between Development, QA, Production, DR, Systems, DBA, Production Support and Network Administration, Applications group for project completion ahead of time and under budget • Managed DNS, NIS, NIS +, DHCP, LDAP, SFTP, jumpstart, Apache, Tomcat, Websphrer and HP OpeNetwork Administration, Applications group for project completion ahead of time and under budget • Managed DNS, NIS, NIS +, DHCP, LDAP, SFTP, jumpstart, Apache, Tomcat, Websphrer and HP Open View.
Approximately 30 percent of Facebook users are between the ages of 25 and 34, making it the largest age demographic on the social network.
Social networking sites have taken the place of word of mouth between neighbors, and popular sites like Houzz and Pinterest let users share ideas and opinions on home trends with a seemingly endless social network.
a b c d e f g h i j k l m n o p q r s t u v w x y z