These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time here is 04:01 on 2017-11-25.

25.11.2017
Deep Learning 00:24:00 jim
Classification 00:21:35 jim
Pattern-recognition 00:17:23 jim
24.11.2017
Backpropagation 13:06:40 jim
Sigmoid function 12:59:16 jim
Sigmoid function/stock-vector-sigmoid-function-451998487.jpg 12:57:08 jim sigmoid-function
Activation Function 12:49:12 jim
Relational Learning 12:38:10 jim
Motor Learning 12:37:11 jim
Observational Learning 12:36:12 jim
Spatial Learning 12:30:23 jim
Auditory Learning 12:30:05 jim
EDirectory Synchronization 12:24:45 jim
Understanding DIT Structure Rules 12:24:07 jim
Inheritance 12:22:42 jim
Placement Policy Set 12:22:31 jim
Web of Trust 12:22:06 jim
GCP Resource 12:21:45 jim
Forest Root Domain 12:21:16 jim
Directory Partition Hierarchy 12:20:41 jim
RBAC Hierarchical 12:19:04 jim
Hierarchical 12:18:02 jim
OID 12:17:01 jim
Hierarchy 12:15:03 jim
NAME 12:13:19 jim
Variable 12:12:46 jim
Supervised Learning 12:03:18 jim
Learning 12:02:36 jim
Shift Invariant Artificial Neural Network 11:42:51 jim
Space Invariant Artificial Neural Network 11:41:49 jim
SIANN 11:37:49 jim
CNN 11:28:44 jim
Convolutional Neural Network 11:28:28 jim
Multilayer Perceptron 11:25:31 jim
MLP 11:24:58 jim
Artificial Neural network 11:12:28 jim
23.11.2017
OAuth 2.0 NOT an Authentication protocol 11:29:45 jim
21.11.2017
10BASE-T 11:41:40 jim
History of LDAP 11:41:11 jim
Z-Wave 11:28:53 jim
Z-Wave Primary Controller 11:23:36 jim
Z-Wave Controller 11:21:17 jim
Manchester code 11:18:15 jim
Z-Wave Home ID 11:13:39 jim
Z-Wave Node ID 11:11:56 jim
Network Layer 10:58:41 jim
Z-Wave Network 10:54:38 jim
Z-Wave Node 10:51:41 jim
RFC 0793 10:47:47 jim
CBOR Object Signing and Encryption 10:43:48 jim
Node 10:41:01 jim
Strategies for Using Power for Communication 10:40:06 jim
Classes of Energy Limitation 10:36:56 jim
Scaling Properties 10:35:52 jim
LoWPAN 10:35:16 jim
Low-Power and Lossy Network 10:33:30 jim
Terminology for Constrained-Node Networks 10:30:45 jim
Constrained Nodes 10:26:41 jim
Device 10:22:21 jim
Unified Extensible Firmware Interface 10:17:39 jim
EFI 10:14:40 jim
Extensible Firmware Interface 10:14:23 jim
UEFI 09:51:17 jim
Firmware 09:50:29 jim
Basic Input-Output System 09:47:05 jim
BIOS 09:44:34 jim
Web Blog_blogentry_211117_1 09:38:52 jim
20.11.2017
WholeSubtree 17:20:08 OrangeDog Completely wrong: was describing SubordinateSubtree
Trusted Execution Environment 00:49:51 jim
19.11.2017
OAuth Security Topics 15:05:15 jim
Grant Types 14:43:42 jim
16.11.2017
HTTP 101 14:30:16 jim
HTTP Status Code 14:26:06 jim
Informational 14:22:20 jim
URL redirection 14:08:30 jim
Openid-configuration 14:02:53 jim
API Economy 13:19:27 jim
TLS 1.3 12:34:59 jim
OAuth 2.0 Authorization Server Metadata 12:13:16 jim
Resource Owner Password Credentials Grant 00:26:14 jim
Resource Owner Password Credentials Grant/OAuth2 — Resource Owner Password Credential Grant.jpg 00:24:45 jim Resource Owner Password Credential Grant
15.11.2017
Web Host Metadata 14:40:29 jim
Host-meta 14:32:24 jim
OpenID Provider Issuer Discovery 14:27:06 jim
Well-Known URIs 14:06:47 jim
Well-known 14:04:20 jim
JSON Resource Descriptor 13:40:34 jim
WebFinger 13:29:01 jim
Web Linking 13:13:36 jim
Link Relation Types 13:05:15 jim
QUIC 02:30:31 jim
Quick UDP Internet Connections 02:29:16 jim
User Datagram Protocol 02:22:24 jim
14.11.2017
Eran Hammer 14:25:49 jim
OAuth 2.0 Vulnerabilities 14:23:40 jim
RFC 5849 14:06:35 jim
RFC 6749 14:05:59 jim
OAuth 14:03:37 jim
Access Proxy 13:43:14 jim
WEB Access Management 13:41:03 jim
Access Control 13:39:31 jim
Access Control Service 13:37:36 jim
Access Control Engine 13:35:03 jim
RFC 4949 13:32:22 jim
Verification 13:26:14 jim
Authentication 13:20:04 jim
Diffie-Hellman key-exchange 12:47:25 jim
OAuth 2.0 for Native Apps 12:42:04 jim
12.11.2017
Client_id 20:41:38 jim
Creating an OAuth 2.0 Client Application 20:35:17 jim
OAuth Client 20:25:48 jim
Identity Assurance Level 20:09:11 jim
Open Trust Taxonomy for OAuth2 20:00:48 jim
Trust Elevation 19:58:23 jim
User-Managed Access 19:49:28 jim
RqP 19:29:39 jim
Requesting Party 19:28:25 jim
JSON Web Algorithms 14:49:28 jim
JSON Object Signing and Encryption Registry 14:44:23 jim
JSON Web Key Types 14:43:45 jim
JWK Set 14:42:30 jim
Jwks_uri 14:25:12 jim
JWK 14:08:57 jim
OAuth Dynamic Client Registration Metadata 14:06:48 jim
Jwks 14:05:12 jim
Identity Token 14:01:07 jim
11.11.2017
Episodic Learning 14:47:03 jim
Artificial Neuron 14:25:11 jim
Year 1959 14:22:58 jim
Machine Learning 14:22:15 jim
Neuron 14:21:44 jim
Stimulus-Response 14:19:08 jim
Learn 14:11:54 jim
Artificial Intelligence 14:03:32 jim
Problem Solving 13:56:32 jim
Linguistic 13:55:32 jim
Perception 13:54:05 jim
Reasoning 13:47:21 jim
09.11.2017
Data Controller 14:40:20 jim
Data Processor 14:37:50 jim
General Data Protection Regulation 14:13:02 jim
Personal data 12:39:55 jim
08.11.2017
Mutual TLS Sender Constrained Resources Access 14:10:09 jim
Mutual TLS for OAuth Client Authentication 14:00:17 jim
Digital certificate request 13:58:14 jim
How SSL-TLS Works 13:55:57 jim
Mutual TLS Profiles for OAuth Clients 13:34:10 jim
OAuth Token Endpoint Authentication Methods 13:28:01 jim
OAuth Parameters Registry 13:16:54 jim
Certificate-based Authentication 12:59:30 jim
Non-Repudiation 12:57:25 jim
Certificate Chain 12:53:45 jim
07.11.2017
Virtual Integrated Network Service 18:06:00 jim
StreetTalk 18:04:45 jim
IEEE 802.11 17:51:22 jim
Ethernet 17:46:07 jim
XNS 17:34:47 jim
Xerox Network Systems 17:33:06 jim
VINES 17:22:24 jim
Banyan VINES 17:19:21 jim
VINES Internetwork Protocol 17:14:32 jim
Directory Service 17:11:27 jim
Linked Data 13:18:22 jim
JSON for Linking Data 13:18:05 jim
Hypermedia As The Engine Of Application State 13:06:46 jim
06.11.2017
OpenID Connect Discovery 14:15:19 jim
04.11.2017
Schema Extensions 13:37:50 jim
03.11.2017
Determining the FDN 16:40:49 jim
02.11.2017
Ian Glazer 21:24:23 jim
Google Remote Procedure Call 18:54:03 jim
Edge Proxy 14:18:22 jim
Web Blog_blogentry_021117_1 14:16:12 jim
API-Gateway 14:11:11 jim
30.10.2017
Certificate Revocation 09:46:26 jim
DNS Certification Authority Authorization 09:42:40 jim
RR 09:34:59 jim
DNS Resource Records 09:34:36 jim
RFC 6844 09:30:17 jim
CAA 09:28:18 jim
User-agent 09:21:23 jim
HPKP 09:19:44 jim
Public Key Pinning Extension for HTTP 09:19:20 jim
Certificate Transparency 09:17:48 jim
29.10.2017
JSON-LD Examples 15:33:38 jim
SAML V2.0 08:22:04 jim
28.10.2017
JAN 19:35:37 jim
Japanese Article Number 19:35:18 jim
Global Trade Item Number 19:34:08 jim
International Article Number 19:32:46 jim
ISO 10957 19:31:51 jim
ISMN 19:30:44 jim
International Standard Music Number 19:30:24 jim
ISSN 19:27:25 jim
International Standard Serial Number 19:27:02 jim
European Article Number 19:23:42 jim
International Standard Book Number 19:14:26 jim
GS1 Company Prefix 19:10:19 jim ISBNs ==> ISBN
ISBN 19:10:19 jim ISBNs ==> ISBN
Manufacturer Code 19:08:26 jim
Product Code 19:08:10 jim GS1 Prefix ==> GS1 Company Prefix
Check Digit 19:01:49 jim
EAN 18:44:08 jim
GS1 18:43:22 jim
Universal Product Code 18:40:57 jim
Authenticator 18:05:48 jim
Google Group 14:38:32 jim
27.10.2017
Universal Links 11:59:06 jim
AppAuth 11:48:05 jim
IOS.URIScheme 11:45:33 jim
Private-Use URI Scheme Redirection 11:40:03 jim
Claimed Https Scheme URI Redirection 11:39:52 jim
Loopback Interface Redirection 11:39:34 jim
OAuth 2.0 Client Registration 11:39:20 jim
Private URI Scheme 11:21:38 jim
Custom URI scheme 10:58:39 jim
RFC 7595 10:56:46 jim
Web Blog_blogentry_261215_1 10:23:02 jim
SFSafariViewController 10:22:30 jim
OpenID Connect Use Cases 10:21:21 jim
OAuth Public Client 10:20:47 jim
Custom URI scheme pattern 10:13:08 jim
URI Fragment Identifiers 09:30:18 jim
Same-Document Reference 09:26:27 jim
Absolute URI 09:09:24 jim
PwdProperties 09:09:11 jim
Group Policy 09:06:48 jim
GPO 09:06:20 jim
Cleartext 08:56:56 jim
Plaintext 08:56:33 jim
URI Schemes 08:48:14 jim
Password Storage Scheme 08:41:49 jim
RC4 08:39:27 jim
Authentication Password Syntax 08:31:58 jim
SupportedAuthPasswordSchemes 08:28:29 jim
AuthPasswordSyntax 08:22:13 jim
AuthPasswordObject 08:17:36 jim
AuthPassword 08:14:12 jim authPassword ==> AuthPassword
RFC 3112 08:13:50 jim
GroupOfEntries 08:03:39 jim
LDAP Group 08:00:46 jim
GroupOfNames 07:57:28 jim
26.10.2017
Media Access Control 13:40:20 jim
Data-link Layer 13:33:04 jim
LLC 13:24:44 jim
Logical Link Control 13:24:32 jim
Bluetooth 13:22:11 jim
Media Access Control Address 13:21:06 jim
IEEE 802.3 13:19:38 jim
IEEE 802 13:18:50 jim
IEEE 802.15.1 13:17:54 jim
Certificate Pinning 12:52:51 jim
IMT-Advanced 12:50:16 jim
3rd Generation Partnership Project 12:48:25 jim WiFi ==> Wi-Fi
Wi-Fi 12:48:25 jim WiFi ==> Wi-Fi
General Packet Radio Service 12:42:29 jim
3GPP 12:41:10 jim
ETSI 12:40:48 jim
European Telecommunications Standards Institute 12:40:27 jim
5G-ENSURE 12:33:52 jim
5G 12:33:12 jim
LTE 12:28:12 jim
Long Term Evolution 12:27:57 jim
International Telecommunication Union 12:25:46 jim
ITU Radiocommunication Sector 12:18:37 jim
ITU-R 12:17:39 jim
4G 12:14:08 jim
Web Blog_blogentry_261017_1 12:04:06 jim
Responsive Organizations 11:46:27 jim

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-3) was last changed on 11-Jul-2017 21:54 by jim