TITLE

Jargon Buster

PUB. DATE
November 2014
SOURCE
Journal of Essential Oil-Bearing Plants;Nov2014, Vol. 17 Issue 6, p93
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
110145758

 

Related Articles

  • uTorrent 1.6.1. Sbarski, Peter // APC (Bauer Media Group);Jun2007, Vol. 27 Issue 6, p48 

    The article evaluates the uTorrent 1.6.1 computer software from Bittorrent.

  • Piracy Tracking System of the BitTorrent. Jungjae Lee; Jongweon Kim // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p191 

    In this paper, we investigated the problem of copyright infringement in the peer-to-peer (P2P) environment, and proposed a system for piracy tracking. Even though the BitTorrent P2P software is a very efficient way to transfer files, it has become the main tool used to pirate copyrighted...

  • WHAT YOU MUST NOT DOWNLOAD IN 2016. Williams, Wayne // Web User;12/30/2015, Issue 387, p38 

    The article reviews several free downloadable programs in 2016 including uTorrent at utorrent.com, PC Matic system tool at www.pcpitstop.com, and Advanced SystemCare 9 at www.iobit.com.

  • BitTorrent in Corporate Networks a Sign of Breaches: BitSight. Lemos, Robert // eWeek;12/17/2015, p1 

    The article reports that companies that have protocol BitTorrent in their networks are likely to have infected systems with malware and other signs of a breach, according to a study conducted by security firm BitSight. Topics discussed include applications and games downloaded through BitTorrent...

  • WuKong: a practical video streaming service based on native BitTorrent and scalable video coding. Liu, Pin-Chuan; Leu, Jenq-Shiou; Lee, Tsung-Chieh; Chen, Tien-Ho; Yee, Yun-Sun; Shih, Wei-Kuan // Multimedia Tools & Applications;Sep2012, Vol. 60 Issue 1, p47 

    Many researches on peer-to-peer video streaming have focused on dealing with highly dynamic, high-churn P2P environment. Most of P2P streaming protocols were modified from a P2P file sharing protocol. Inspired by the high performance on peer-to-peer file sharing of BitTorrent, we propose an...

  • BitTorrent Sync Free, Private Syncing. Salter, Chris // Micro Mart;4/3/2014, Issue 1305, p64 

    The article details the process of using BitTorrent Sync software program to create a personal cloud computing system. Topics discussed include the features of the software, use of the Raspberry Pi computer as a server node and steps in setting up BitTorrent Sync on the Pi. Also discussed are...

  • Traffic Modeling and Analysis on BitTorrent-Like Peer-to-Peer Networks. Hong Tang; Yu Yan; Rong Hu; Cong-Cong Xing // Journal of Convergence Information Technology;Feb2013, Vol. 8 Issue 4, p1 

    Although extensive research has been conducted on the complex nature of P2P networks, there is still a lack of systematic understanding on the cause of these complexities. In particular, the issue of how the internal operating mechanism and structure exactly lead to the external and observable...

  • Stay Safe Online.  // Web User;3/25/2015, Issue 367, p12 

    The article offers news briefs along with two questions and answers related to computer security measures as of Mrach-April 2015. Topics discussed include installation of Epic Scale, a program that can turn computer into a "Bitcoin miner," from BitTorrent, a protocol for peer-to-peer file...

  • LIGHT AT THE END OF THE NARROW TUNNEL. Mehta, Shipra // Journal of Art, Technology & Intellectual Property Law;Spring2014, Vol. 24 Issue 2, p425 

    The article explores whether joinder should be allowed for lawsuits based on copyright infringement of films and music conducted through BitTorrent Protocol technology in the U.S. It states that joinder should only be used at the start of the lawsuit when the plaintiffs are attempting to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics