Join ACM and take advantage of thousands of online courses, video tutorials, and online books available through ACM’s online Learning Center. Stay ahead of the curve by reading Communications of the ACM, our monthly flagship publication that delivers incisive essays, reviews and research, and ACM Queue, an online magazine for software developers written by leading software engineers, computing researchers and tech entrepreneurs.Sponsored Listing
- Grouping and Descriptive Categories (2)
- Modern (2)
- Other Operating Systems (2)
- Windows (2)
- BSD (1)
- Embedded Operating Systems (1)
Our aim is providing fixed nodes with redundancy, share unused bandwidth, and create hotspots with base services(web,email,IM,etc.) for any roaming user. GOAL - To make sharing your excess bandwidth as easy as setting up a NAT (Or XP ICS). Admins Needed!
The SecurityStalker(c) & IA Defender(c) projects are scalable, solutions to fighting internet abuse aimed at single user, SOHOs' and corporate network environments. Reacts to both external and internal threats. Extensive reporting. SpamPal aware.