Library items tagged:

Video Tests Summary section 1. Fine Detail on Presentation Images   Fine detail on the presentation input appeared slightly distorted; this was most evident on PC desktop text. With the PC laptop output resolution set to 720p a direct connection from the PC laptop HDMI output to the monitor produced acceptable results, with the XT5000 720 codec connected between the PC laptop and the Monitor the PC image viewed locally appeared distorted. The PC image also appeared distorted at the remote codec.
Manufacturer: AvayaModel: XT5000 720Software Version: 8.3Optional Features and Modifications: USB recordingDate of Test: 17-21 March 2014
Manufacturer: AvayaModel: XT5000 720Software Version: 8.3Optional Features and Modifications: USB recordingDate of Test: 17-21 March 2014
By Pranay Pancholi, Loughborough University 26/3/2014 Whilst there is a large choice of Wi-Fi analytical tools available for the PC market, the choice available to MAC OS X users is somewhat limited. This document provides an overview of 8 applications – some are free and others have a cost - that can be used to assist with Wi-Fi stumbling and surveying on Mac OS X. They can help in various ways to troubleshoot and diagnose wireless connectivity issues in the field:
BWH Introduction The Backup Web Hosting (BWH) service is intended as a simple emergency web site which you may direct web queries to when your main website is offline. This could provide a holding page or pages with basic information. It is not intended as a full backup website, just an emergency web presence so that people trying to access your resources can be given information such as details of the current maintenance or outage, alternate ways to contact your site, or links to alternative resources which may still be available.
Anonymous
Eligibility for an ac.uk Domain Name 1.    An organisation is eligible to register names in the ac.uk domain name space if it meets the purpose of the domain as expressed in clause 2 below and meets at least one of the items in clause 3 below.
Network time protocol (ntp) servers are regularly being used to reflect and amplify spoofed UDP packets towards the target of a DDoS attack. Attacks are growing in size and frequency and sometimes even cause issues for the organisations hosting the reflectors. Servers offering the 'monlist' command are particularly troublesome and can provide a huge amplification affect.
By Pranay Pancholi, Loughborough University Introduction Today’s world offers us a plethora of new mobile devices and consumer-based electronics such as smartphones, tablets, laptops, gaming consoles, smart televisions and digital signage displays, all requiring Wi-Fi connectivity.  These devices are application-centric and the delivery of multimedia content to these devices has seen a large increase in network traffic within the home and enterprise networks.