Sentences with phrase «data packets from»

Much like the internet routes data packets from one network point to another network point, the Lightning Network routes payments across multiple interconnected payment channels.
Catch up The mission team was able to download and analyse 300 data packets from Philae during its brief communication on Saturday, but they revealed that over 8000 more are sitting in the lander's memory awaiting transmission.
Saturday night, ESA mission managers received a precious 300 data packets from Philae in a short 85 - second - long transmission — bare - bones information about the health of the lander, discovered Ulamec, Philae's project manager at the German Aerospace Center near Cologne.
On the other hand, social scientists typically have not needed the kinds of computer algorithms that computer scientists need to route a data packet from one place to another on the Internet.

Not exact matches

«I was one step up from a super volunteer that cut turf, printed walk packets, knocked on doors, made phone calls, collected tons of paper and stayed up to two a.m. entering data, six days a week for months,» he recalls.
However, he says there is a lesson in the way London - based satellite communications firm Inmarsat's engineers traced flight MH370's route by analysing just seven empty data packets sent from the plane.
Simulating the loneliness of the real Red Planet, we removed the SIM cards from our phones and were issued new email addresses to communicate with mission support, with a 20 - minute delay on either end — the time it would take for the data packets to span the gap between Earth and Mars when Mars is at its farthest.
Only when the app determines that the vibration is from a quake does it briefly activate the phone's GPS to obtain the phone's position and push a short packet of information out through a data or wifi connection.
Using data from a two - week stretch in April 2005, the Cooperative Association for Internet Data Analysis (CAIDA) traced these packets» paths from hub to hub and country to country to capture a snapshot of the worldwide network topoldata from a two - week stretch in April 2005, the Cooperative Association for Internet Data Analysis (CAIDA) traced these packets» paths from hub to hub and country to country to capture a snapshot of the worldwide network topolData Analysis (CAIDA) traced these packets» paths from hub to hub and country to country to capture a snapshot of the worldwide network topology.
Data entry staff then manually input additional data from these Compliance PackData entry staff then manually input additional data from these Compliance Packdata from these Compliance Packets.
The way that Whispernet connections slip data over the airwaves may also play a part — forwarding data from cell phones from tourists inside China to foreign networks happens just like it does when roaming to other nations, so perhaps the Whispernet data packets are being simply sent back and forth without having to go through a server that detects if they're stuffed with «illegal» content.
Site users are prohibited from violating or attempting to violate the security of this Site, including without limitation: (1) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (2) using this Site for unintended purposes or trying to change the behavior of this Site; (3) attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without proper authorization; (4) attempting to interfere with service to any user, host or network, including without limitation, via means of submitting a virus to this Site, overloading, «flooding,» «spamming,» «mailbombing» or «crashing»; (5) forging any TCP / IP packet header or any part of the header information in any e-mail or newsgroup posting; and (6) forging communications on behalf of this Site (impersonating this site) or to this Site (impersonating a legitimate user).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
The NSA is also building a huge data center in Utah to suck down every packet of information from the Internet that it can find, encrypted or not.
From the Nintendo 3DS, the program is called «Monster Hunter 3 Ultimate Data Transfer Program» and from the Wii U system, it is the «Monster Hunter 3 Ultimate Packet Relay Tools for Nintendo 3DS.&raFrom the Nintendo 3DS, the program is called «Monster Hunter 3 Ultimate Data Transfer Program» and from the Wii U system, it is the «Monster Hunter 3 Ultimate Packet Relay Tools for Nintendo 3DS.&rafrom the Wii U system, it is the «Monster Hunter 3 Ultimate Packet Relay Tools for Nintendo 3DS.»
tech.slashdot.org - Security researcher Will Strafach took a look at Onavo Protect, a newly released VPN service from Facebook: I found that Onavo Protect uses a Packet Tunnel Provider app extension, which should consistently run for as long as the VPN is connected, in order to periodically send the following data t...
Initial comments from SK Telecom, KT Telecom and LG Telecom were initially «hostile» to the free calling service, which was unveiled on June 4 in the country, and data from Kakao Talk's own monitoring system suggests as much as 50 percent of the data packets required are being dropped, with significant effects on call quality.
Conducted an honors project «Prediction and Properties of the Original Data Traffic from Sampled Packets»
Administrative Technician III for Texas Department of Transportation: - Implement improved and time saving procedures; consistently reduce overhead costs, improve workflow and increase office efficiency - Create and maintain a database of public assistance complaints; assign an internal investigator to each case and follow - up once closed - Developed and monitor a calendar system using PowerPoint where accurate records of vacation / sick leave / comp time used and accrued are tracked month - to - month for comparison with monthly time sheets - Answer inquiries from the general public, vehicle storage facility operators, motor carriers, the trucking industry and other state / federal agencies regarding rules, laws and regulations governing the issuance of motor carrier credentials - Prepare correspondence (email and written) and review for completeness and correctness - Field calls and manage administration, resolve a wide - range of staff dilemmas and challenging situations on a daily basisPrincipal Administrative Assistant for Solar Turbines, Inc.: - Provided support to Directors, Department Managers, Project Managers and Project Engineers as well as international personnel - Maintained detailed calendars of appointment schedules for business meetings, conferences, domestic / international travel arrangements and special events - Expertly ran this fast - paced, large office encompassing office and structure maintenance, scheduling of machine / equipment service and repairs, and ordering and stocking office supplies; updated and maintained department web pages - Compiled, created and distributed financial reports and PowerPoint presentations - Edited and formatted technical documentation and maintained filing systems - Coordinated extensive domestic and international travel arrangements, including air, hotel, car and meeting locations - Planned departmental meetings, special events and office movesSenior Administrative Assistant for Solar Turbines, Inc.: - Supported Department Manager and Supervisors, Manufacturing Engineers and shop personnel - Tracked and monitored pending and confidential correspondence and financial information - Prepared apprenticeship packets for distribution; received applications, recorded data, and set - up and coordinated Differential Aptitude Tests; notified applicants of test results and set - up initial interviews - Coordinated special events; managed information systems and maintained web pages; oversee special projects - Resolved office obstacles, communication barriers and complicationsSenior Program Assistant for Solar Turbines, Inc.: - Photographed, downloaded and printed digital pictures of parts, processes and people involved in Rotor CAM area - Created and produced departmental newsletter; initiated Receiving Inspection Records Retention process (scanned records onto CD for easy and accessible retrieval and storage)- Set - up and coordinated meetings and special events; created slide show presentations and maintained web pagesPage 2
Utilized the knowledge gained from research to data mine Netflow and packet capture repositories in order to identify current threats.
The Lennard Clinic (Newark, NJ) 09/2004 — 03/2006 Administrative Assistant • Provided outstanding front office customer service, reception, and office administration services • Distributed applications and orientation packets verifying information for accuracy • Gathered risk - related data from internal and external resources that involved AIDS and HIV clients • Produced reports and presentations outlining findings, risk positions, and recommended changes
• Scrutinized data from DORA, Star Math and Acuity assessments tracked trends and created resource packets for teachers to use to address weaknesses.
In addition, they directed me to the Kids Count Data Set from the Annie E. Casey Foundation from which I developed Kentucky - specific reports to include in my packet of information for legislators.
a b c d e f g h i j k l m n o p q r s t u v w x y z