abstractman.hu | along the axes. The saddle surfaces are meeting in the solid’s center, each touching the nucleus with one end of its convex generatrix. The other endpoint of the convex arcs are found at the quadruple meetings of the rhombic dodecahedral frame. Both endpoints of the concave generatrices are situated | path endpoint, endpoint second, inner endpoint, endpoint outer, outer endpoint | surface, solid, shape, edge, case | 9 |
f12.hu | The mechanism in short: Entra creates a ‘mini-CA’ which issues a short-lived certificates to clients; when a Windows VPN client is configured to use DeviceCompliance flow, the client attempts to get a certificate from Entra before connecting to the VPN endpoint (from an admin standpoint a ‘VPN… | vpn endpoint, endpoint admin, beta endpoint, endpoint preview, accidentally endpoint | hello, application, user, sign, certificate | 5 |
kontron.hu | Check Point – border protection, endpoint and other security solutions (4Star partner Partner, Support Provider) | multiple endpoint, endpoint retail, generation endpoint, endpoint protection, protection endpoint | solution, system, network, cloud, customer | 3 |
mionarix.hu | We mostly work on projects related to games that have been in operation since 2011 and are globally recognised. We build websites, webshops, API endpoints and other web development for our clients. We also strive to provide solutions tailored to the specific needs and business objectives of the… | api endpoint, endpoint generation, endpoint web | development, website, client, reference, site | 2 |
mta.hu | The Art of the State: Modelling the Endpoints of Evolution by Natural Selection – John M. McNamara, Honorary Member, Inaugural academic Lecture | state endpoint, endpoint evolution | academy, science, hungarian, research, sciences | 2 |
piksys.hu | Protect sensitive data wherever it’s used—on premises, in the cloud, or at the endpoints—with products that expand visibility and control over the flow and use of your sensitive information. Confidence, integrity, and availability of information are a prerequisite for business continuity, although… | endpoint protection, cloud endpoint, endpoint product | security, knowledge, strength, solution, threat | 2 |
hwg4sc.hu | The data on this page is sourced from the endpoint of the Telemetry app . This data comprises performance data represented by 'buckets' displayed as square boxes on the page, each containing information on CPUs, GPUs, and average fps. By parsing the CPU and GPU names, I collected the average fps… | page endpoint, endpoint telemetry | hardware, guide, game, performance, datum | 1 |
katalizis.hu | Many of the existing motivational models assume two different forces - one which resolves boundaries and results similarity, and the other which creates boundaries and results differences. These are the two conflicting and complementary forces which spans the endpoints of Catalysis model as well… | force endpoint, endpoint catalysis | theory, motive, model, motivation, action | 1 |
isaac.hu | Any iSaac Chech EndPoint / Interface. The effectiveness of supervision within a site, security system unit is a direct consequence of the definition of the legal and professional check points established by the delimiting "concentric" security zones. | chech endpoint, endpoint interface | system, security, communication, safety, site | 1 |
ipfone.hu | Unfortunately there seems to be a bug in the RMX. When it send 720p30 resolution stream to an endpoint, the low resolution slide is used. The HD slide is used only if 1080p30 stream is sent to the video endpoint. | stream endpoint, endpoint low | protocol, remote, configuration, server, exam | 1 |
jet-vill.hu | Endpoint devices like power outlets, consumption meters, secure plugs and telecommunication terminals will guarantee the best connection methods possible without disturbing the cityscape. | | underground, product, equipment, technology, installation | 1 |
halacs.hu | Usually in corporate environment, or e.g in case of bigger schools., network administrators use application level proxies. A proxy can make internet access much faster as well as safer, however, these effects are getting more insignificant while secure connections are emerging. On the other hand… | hand endpoint, endpoint proxy | site, clock, network, wall, agent | 1 |
itkarbantartas.hu | ITSecure Ltd. attaches great importance to providing its customers with high quality and modern IT services. We aim to provide secure IT systems for our customers by ensuring ease of use and by using the latest technologies. | endpoint protection | cloud, development, network, operation, infrastructure | 0 |
monera.hu | …to the self-service payment. Although the Hungarian market is still significantly behind the EU countries in this special area but feedbacks from market players and partners we see that there is a serious need of a professional team offering complete solution for the dynamically growing market. | | system, hungarian, product, self, payment | 0 |
puraset.hu | Our regenerative adsorbents remove arsenic, fluorine, boron, iodine, iron, manganese, and ammonia from drinking water. As bulk filter materials, our products are an excellent solution for water utilities and water industry companies. | | water, solution, treatment, product, development | 0 |
alliedsoft.hu | Allied Software Systems offers professional services to their customers since 2003. Main areas: software development, IT network management, digital cartography. | enterprise endpoint, endpoint protection, cognitive endpoint, endpoint security | software, system, automotive, reference, customer | 0 |
gudszent.hu | Tags are a crucial topic when it comes to Azure. They help us to organize our resources in the cloud, but also to monitor and manage them. The tags are also very useful for the financial aspect, be... | | script, powershell, free, archive, resource | 0 |
clico.hu | Arista Networks… Armis… Cloudflare… Cloudian… CyberArk… DIGI International… Entrust… Exabeam… Fidelis… | endpoint security | network, security, gateway, application, encryption | 0 |