際際滷shows by User: BlossomMehta / http://www.slideshare.net/images/logo.gif 際際滷shows by User: BlossomMehta / Thu, 03 Mar 2016 02:11:40 GMT 際際滷Share feed for 際際滷shows by User: BlossomMehta Data Validation for Business Continuity Planning /slideshow/data-validation-for-business-continuity-planning/58996955 presentation1-160303021141
Security Standards and Audit]]>

Security Standards and Audit]]>
Thu, 03 Mar 2016 02:11:40 GMT /slideshow/data-validation-for-business-continuity-planning/58996955 BlossomMehta@slideshare.net(BlossomMehta) Data Validation for Business Continuity Planning BlossomMehta Security Standards and Audit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021141-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security Standards and Audit
Data Validation for Business Continuity Planning from POOJA MEHTA
]]>
358 10 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021141-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Memory Handling and Garbage Collection in Python /slideshow/memory-handling-and-garbage-collection-in-python/58996932 presentation1-160303021023
Python]]>

Python]]>
Thu, 03 Mar 2016 02:10:23 GMT /slideshow/memory-handling-and-garbage-collection-in-python/58996932 BlossomMehta@slideshare.net(BlossomMehta) Memory Handling and Garbage Collection in Python BlossomMehta Python <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021023-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Python
Memory Handling and Garbage Collection in Python from POOJA MEHTA
]]>
568 6 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021023-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Otp authentication scheme based on ECC /slideshow/otp-authentication-scheme-based-on-ecc/58360640 otp-authentication-scheme-based-on-160217074034
Otp authentication scheme based on ECC]]>

Otp authentication scheme based on ECC]]>
Wed, 17 Feb 2016 07:40:34 GMT /slideshow/otp-authentication-scheme-based-on-ecc/58360640 BlossomMehta@slideshare.net(BlossomMehta) Otp authentication scheme based on ECC BlossomMehta Otp authentication scheme based on ECC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/otp-authentication-scheme-based-on-160217074034-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Otp authentication scheme based on ECC
Otp authentication scheme based on ECC from POOJA MEHTA
]]>
564 4 https://cdn.slidesharecdn.com/ss_thumbnails/otp-authentication-scheme-based-on-160217074034-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fault tolerance in Big Data /slideshow/fault-tolerance-in-big-data/58360484 presentation1-160217073501
Big Data]]>

Big Data]]>
Wed, 17 Feb 2016 07:35:01 GMT /slideshow/fault-tolerance-in-big-data/58360484 BlossomMehta@slideshare.net(BlossomMehta) Fault tolerance in Big Data BlossomMehta Big Data <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217073501-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Big Data
Fault tolerance in Big Data from POOJA MEHTA
]]>
831 9 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217073501-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Computer organization and architecture /slideshow/computer-organization-and-architecture-58360458/58360458 computer-organization-and-architecture-160217073337
COA]]>

COA]]>
Wed, 17 Feb 2016 07:33:37 GMT /slideshow/computer-organization-and-architecture-58360458/58360458 BlossomMehta@slideshare.net(BlossomMehta) Computer organization and architecture BlossomMehta COA <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/computer-organization-and-architecture-160217073337-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> COA
Computer organization and architecture from POOJA MEHTA
]]>
1976 7 https://cdn.slidesharecdn.com/ss_thumbnails/computer-organization-and-architecture-160217073337-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The optimization and implementation of iptables rules set /slideshow/the-optimization-and-implementation-of-iptables-rules-set/58360348 the-optimization-and-implementation-of-iptables-rules-set-160217072942
iptables]]>

iptables]]>
Wed, 17 Feb 2016 07:29:42 GMT /slideshow/the-optimization-and-implementation-of-iptables-rules-set/58360348 BlossomMehta@slideshare.net(BlossomMehta) The optimization and implementation of iptables rules set BlossomMehta iptables <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-optimization-and-implementation-of-iptables-rules-set-160217072942-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> iptables
The optimization and implementation of iptables rules set from POOJA MEHTA
]]>
308 4 https://cdn.slidesharecdn.com/ss_thumbnails/the-optimization-and-implementation-of-iptables-rules-set-160217072942-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Deadlock Detection /slideshow/deadlock-detection-58360037/58360037 presentation1-160217071833
Deadloack Detection in Distributed System]]>

Deadloack Detection in Distributed System]]>
Wed, 17 Feb 2016 07:18:33 GMT /slideshow/deadlock-detection-58360037/58360037 BlossomMehta@slideshare.net(BlossomMehta) Deadlock Detection BlossomMehta Deadloack Detection in Distributed System <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217071833-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Deadloack Detection in Distributed System
Deadlock Detection from POOJA MEHTA
]]>
1153 6 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217071833-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Data Representation /slideshow/network-data-representation-58359363/58359363 presentation1-160217065149
NDR in Network Programming]]>

NDR in Network Programming]]>
Wed, 17 Feb 2016 06:51:49 GMT /slideshow/network-data-representation-58359363/58359363 BlossomMehta@slideshare.net(BlossomMehta) Network Data Representation BlossomMehta NDR in Network Programming <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217065149-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NDR in Network Programming
Network Data Representation from POOJA MEHTA
]]>
422 6 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160217065149-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-BlossomMehta-48x48.jpg?cb=1622875386 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021141-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/data-validation-for-business-continuity-planning/58996955 Data Validation for Bu... https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-160303021023-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/memory-handling-and-garbage-collection-in-python/58996932 Memory Handling and Ga... https://cdn.slidesharecdn.com/ss_thumbnails/otp-authentication-scheme-based-on-160217074034-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/otp-authentication-scheme-based-on-ecc/58360640 Otp authentication sch...