2013 Intel SINO-US Intelligent Embedded System Academic Workshop

Authored by jeff-xia (Intel)
点击返回“学术活动”页面 >>


Last updated on 2013/09/13 - 08:09


Authored by PENG W. (Intel)
Traditionally, two-factor authentication uses a one-time password (OTP), which combines something the user knows (a username and password) and something the user has (typically, a token or key fob that produces a six-digit number, valid only for a short period of time and available on demand). If your business is already using two-factor authentication, then you are also familiar with the various... Last updated on 2014/08/12 - 20:29


Authored by 0
IntroductionSecurity breeches of enterprise information systems are on the rise. Not coincidentally, so is corporate spending on security software. Last updated on 2012/08/15 - 08:10

Discovering Mobilized Software

Authored by 0
Supporting the Mobilized Software Initiative

By Justin Huntsman

Last updated on 2012/08/15 - 00:13

Mobile Reference Model:构建企业应用

Authored by 0
IntroductionThe design of the Mobile Reference Model exemplifies the design choices that must be made prior to constructing any application. Last updated on 2012/08/23 - 15:40

使用 MonoGame* 开发游戏

Authored by admin

作者:Bruno Sonnino

Last updated on 2014/06/09 - 22:50


Authored by solstice_
陈硕 (giantchen_AT_gmail) Blog.csdn.net/Solstice 2010 Feb 28 这篇文章原本是前一篇博客《多线程服务器的常用编程模型》(以下简称《常用模型》)计划中的一节,今天终于写完了。 Last updated on 2012/08/20 - 21:41


Authored by
这篇文章原本是前一篇博客《多线程服务器的常用编程模型》(以下简称《常用模型》)计划中的一节,今天终于写完了。 Last updated on 2012/08/23 - 15:40

Karishma Software公司*(KSL):Jeeva*在线医院资源规划系统

Authored by 0
Karishma Software Ltd.* (KSL)The Solutions PeopleJeeva* Online Hospital Resource Planning System, Version 2.1Product Overview Last updated on 2012/08/15 - 07:39

Revolution in Our Hands

Authored by 0
Introduction Mobility Matters: Application Design for a Wireless WorldBy Chris S. Thomas,Intel e-Strategist Last updated on 2012/08/23 - 15:48