Search results
Page title matches
- 7 KB (215 words) - 00:31, 1 March 2008
- 15 KB (568 words) - 00:28, 1 March 2008
- 15 KB (568 words) - 00:01, 1 March 2008
- 11 KB (315 words) - 01:28, 1 March 2008
- Policies about and on this wiki. = General policies =204 bytes (26 words) - 15:35, 25 September 2010
Page text matches
- 2,- '''REMOTE WORK''': Will permit the development of policies of NOT EXPORTING WORKERS but IMPORTING JOBS, as India, China, and some othe45 KB (7,247 words) - 07:19, 9 December 2013
- ...s are helping with the various aspects of our environmental statements and policies. In particular they are helping us craft the best “take-back” system we121 KB (20,194 words) - 12:31, 1 June 2012
- ...curity Council" and appears to be committed to reversing many of Thaksin's policies. Support for open/free source software ''appears'' to have been curtailed b166 KB (1,959 words) - 16:42, 10 February 2011
- ...ll eventually adopt the one that is promoted by their national educational policies.11 KB (1,866 words) - 12:19, 17 March 2010
- ...to prepare populations or ... how to prepare for desaster ... containment policies. Great news aint it ? ...invent the necessary skills? You as young hot shot adults making up these policies... you better have new young people coming under your guidance that are dam110 KB (18,241 words) - 17:01, 1 April 2016
- ...are bought by the government and I wish that was not the case. However if policies were put in place to bypass the government and at the same time make sure t9 KB (1,465 words) - 22:31, 26 February 2012
- .... We expect work done in various projects should conform to the licensing policies of that project; work on OLPC specific projects will likely be GPL/LGPL/MIT14 KB (2,253 words) - 17:51, 19 March 2008
- ...s downstream at the OLPC communities, but also upstream towards government policies regarding bandwidth, frequencies, and so on.13 KB (1,986 words) - 12:20, 19 April 2012
- ...ong with the counselors and trustees will define the school administrative policies and long-term goals.40 KB (6,449 words) - 19:20, 7 February 2009
- ...are bought by the government and I wish that was not the case. However if policies were put in place to bypass the government and at the same time make sure t12 KB (2,056 words) - 15:18, 12 February 2010
- ...ensive remedial measures than others. A combination of projects as well as policies to change government and parental attitude towards child education, reduce10 KB (1,449 words) - 12:30, 17 April 2009
- ...unded in these standards as required by most state department of education policies.2 KB (351 words) - 02:48, 14 February 2007
- ...ties around the world; their close knowledge of and ties with programs and policies and initiatives in India; and their interest in helping their country. TiE679 bytes (115 words) - 11:43, 20 December 2009
- ...way the WiFi could use external RAM buffers so it could implement some QoS policies. Also no way to store an incoming feed to flash. Am wondering whether chang10 KB (1,856 words) - 21:58, 12 May 2007
- <RITSteve> Labs cant be used due to (somewhat ridiculous) security policies re running other OS on machines either on the machines hardware or via a US33 KB (4,926 words) - 15:45, 20 August 2010
- The claim is made that Nicholas Negroponte's policies are driving out key people. Here are some of them.31 KB (4,909 words) - 23:08, 22 August 2011
- On the laptops the policies are a bit more strict, but the principle remains the same. With a finite a24 KB (3,966 words) - 13:51, 2 September 2009
- ...understanding of how to use them. They have not prepared infrastructure or policies to permit rapid connection before the cable landed. They still have a long5 KB (817 words) - 03:40, 10 December 2008
- On the laptops the policies are a bit more strict, but the principle remains the same. With a finite a52 KB (8,603 words) - 22:28, 7 June 2007
- ...limits will be imposed on all non-signed programs. If necessary, different policies can apply to mesh and access point traffic. Additional restrictions might ...as shutting down programs whose buckets remain drained for too long. These policies will be maintained and enforced by the system Security Service, a privilege130 KB (21,703 words) - 03:54, 17 December 2008