Because Windows 2000 has this feature built in, we no longer need the help of other tools to achieve this purpose the. IP layer since it is symmetric encryption of data, the package is the entire IP packet, there is no need for the TCP / IP protocol suite in a separate security settings for each protocol, because the application uses TCP / IP to be data passed to the IP protocol layer, and protection here. Corresponding IPSec configuration is relatively complex, but is transparent to applications, so does not require the application must be supported. The following sub-sections on the concept of IPSec, application of work processes and practices described several aspects:
24 in Microsofts annual TechFest internal science fair, Microsoft will demonstrate how real-time multiple video streaming camera phone stitching, to create a high-resolution video. This is the Microsoft group of three branch offices in Cairo, Egypt came up with the concept, initially to provide video lectures. But soon, they found that the technology has wider applications, streaming live from the citizen journalists to instantly broadcast the wedding to friends and relatives far away place. Cairo Microsoft Innovation Center Ayman Kaheel development manager, said: "Many people have a mobile phone pocket." Just a few steps away, Darren Edge is a demonstration of the proposal called Notes Scape. The aim is to produce a portable virtual sticky notes that can be used around any mobile phone or notebook computer called out. I am a bit puzzled about this technology, but Edge says, this method will contribute to and organize the presentation of information, especially when the science fiction movie wearing the monitor to achieve, we can walk around with images.
About IcFull.com | Services | Payment | Advertisements Service | Contact Us | Links
All rights reserved:iceach.com © 2000-2010 Certificate No.:Guangdong ICP No.08108781