- ISP process
- ingot stirring process — процесс ИСП (перемешивания жидкого металла слитка)
Англо-русский словарь промышленной и научной лексики. 2014.
Англо-русский словарь промышленной и научной лексики. 2014.
Information Search Process — The Information Search Process (ISP) is a six stage process that information seekers go through when seeking information. ISP was first suggested by Carol Kuhlthau in 1991. The six stages of ISP are as follows: Stage 1: Initiation, Stage 2:… … Wikipedia
Border Gateway Protocol — BGP redirects here. For the Formula One Team, see Brawn GP. The Border Gateway Protocol (BGP) is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or prefixes which designate network reachability … Wikipedia
Rocket engine — RS 68 being tested at NASA s Stennis Space Center. The nearly transparent exhaust is due to this engine s exhaust being mostly superheated steam (water vapor from its propellants, hydrogen and oxygen) … Wikipedia
Online Copyright Infringement Liability Limitation Act — OCILLA redirects here. For the town in Georgia, United States, see Ocilla, Georgia. Online Copyright Infringement Liability Limitation Act Full title To amend title 17, United States Code, to implement the World Intellectual Property Organization … Wikipedia
Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… … Wikipedia
Digital Economy Act 2010 — Parliament of the United Kingdom Long title Click show & … Wikipedia
Spam Prevention Early Warning System — The Spam Prevention Early Warning System (SPEWS) was an anonymous service which maintained a list of IP address ranges belonging to Internet service providers (ISPs) which host spammers and show little action to prevent their abuse of other… … Wikipedia
Doe subpoena — A Doe subpoena is a subpoena that seeks the identity of an unknown defendant to a lawsuit. Most jurisdictions permit a plaintiff who does not yet know a defendant s identity to file suit against John Doe and then use the tools of the discovery… … Wikipedia
Layer 2 Tunneling Protocol — In computer networking, the Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). History and future Published in 1999 as proposed standard RFC 2661, L2TP has its origins primarily in two older … Wikipedia
National broadband plans from around the world — Broadband is a term normally considered to be synonymous with a high speed connection to the internet. The term itself is technology neutral; broadband can be delived by a range of technologies including DSL, LTE or next generation access. This… … Wikipedia
Migration Authorisation Code — This article is about the broadband transfer code. For the networking identifier, see MAC address. In the United Kingdom a Migration Authorization Code (MAC) is a 17 to 19 character unique identifier code used by DSL customers when they wish to… … Wikipedia