Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 4,020

5.4. Remote Control with IPMI — High-Performance Computing Technologies

https://www.hpc.temple.edu/mhpc/hpc-technology/exercise1/ipmi.html

As you can see, by default, user 2 is set to be root with ADMINISTRATOR privileges. The mhpc user was set to OPERATOR and has user id 4. To change the default password for a user (assuming you have ADMINISTRATOR rights) can be done with the following command:

Article - Multi-Factor Authentication...

https://tuportal6.temple.edu/web/its/multi-factor-authentication

To better protect your personal information, Temple uses an extra level of security on selected websites called Multi-Factor Authentication (MFA) . It's called Multi-Factor Authentication because in order to access these sites, you will need: your AccessNet username and password one or more designated phones to further verify your identity Once you set up MFA, the next time you log in to a ...

COBIT 5 and GRC - Temple University

https://community.mis.temple.edu/mis5121sec701fall18/files/2018/12/COBIT5-and-GRC_ISACA.ppt

The COBIT 5 principles and enablers are generic and useful for enterprises of all sizes, whether commercial, not-for -profit or in the public sector. COBIT 5 Principles Source: COBIT® 5, figure 2. © 2012 ISACA® All rights reserved. COBIT 5 Enterprise Enablers Source: COBIT® 5, figure 12. © 2012 ISACA® All rights reserved.

Application Security Verification Standard 4.0

https://community.mis.temple.edu/mis5214sec001spring2025/files/2025/01/OWASP-Application-Security-Verification-Standard-4.0.3-en-3.pdf

1.2.3 Verify that the application uses a single vetted authentication mechanism that is known to be secure, can be extended to include strong authentication, and has sufficient logging and monitoring to detect account abuse or breaches.

Citrix Receiver/Online Plugin Troubleshooting - Sites

https://sites.temple.edu/servicedesk/files/2015/02/Citrix-USArmySetupInfo.pdf

Installing the Citrix Receiver (Admin rights are required) Navigate to: http://www.citrix.com/go/receiver.html Accept the terms and conditions and follow the instructions to download and install Citrix Receiver for Windows 4.1.2

Lecture 6 Chapter 3 TCP flow and congestion control

https://cis.temple.edu/~tug29203/19spring-5617/lectures/ch3-3.pdf

example: 1500 byte segments, 100ms RTT, want 10 Gbps throughput requires W = 83,333 in-flight segments throughput in terms of segment loss probability, L [Mathis 1997]: . TCP throughput = 1.22 MSS RTT L to achieve 10 Gbps throughput, need a loss rate of L = 2·10-10 a very small loss rate! new versions of TCP for high-speed

CIS 3207 - Operating Systems

https://cis.temple.edu/~qzeng/cis3207-spring18/

Below is a schedule for this course, which will be updated as the course progresses. Students are thus required to frequently check this webpage for schedule, reading materials, and assignment updates.

Web Application Development - Department of Management Information ...

https://community.mis.temple.edu/mis2402sec004fall2025/2025/08/20/welcome-to-mis-2402/

Hello All, Welcome to MIS 2402: Web Application Development! I am Lauren Kerner, and I will be your instructor for this course. This semester, you will gain an understanding of programming fundamen…

Yichuan Zhu - Temple University

https://www.temple.edu/directory/yichuan-zhu-tup46467

Geodata and AI, 3, 100021-100021. Elsevier BV. doi: 10.1016/j.geoai.2025.100021. Wang, C., Zou, J., Zhu, Y., Li, L., & Shu, D. (2025). A method for calculating the critical safety distance between a tunnel and the existing bridge pile foundation during the oblique side crossing shield construction. KSCE Journal of Civil Engineering, 100328-100328.

Personalized Mobile Targeting with User Engagement Stages: Combining a ...

https://www.fox.temple.edu/sites/fox/files/SHMM_isre.2018.0831.pdf

Table 3 presents our main regression results for two groups of users: active users (i.e., users who had reading records for the pretreatment periods) and all users (both active and inactive users). Generally speaking, the two models returned qualitatively consistent re-sults.