Help


[permalink] [id link]
+
Page "Apoptosis" ¶ 11
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

MAC and also
Cytochrome c is also released from mitochondria due to formation of a channel, the mitochondrial apoptosis-induced channel ( MAC ), in the outer mitochondrial membrane, and serves a regulatory function as it precedes morphological change associated with apoptosis.
* Requires destination computer MAC address ( also may require a SecureOn password )
* ANSI X3. 139-1987, Media Access Control ( MAC ) — also ISO 9314-2
Layer 2 switching is hardware based, which means switches use application-specific integrated circuit ( ASICs ) to build and maintain filter tables ( also known as MAC address tables ).
Therefore, not only the measure but also the position of MAC is often important.
The MAC also condemned this act by Israel and called upon the Israeli authorities to take the strongest measures to prevent a recurrence of such a breach of the GAA and to refrain in the future from bringing to Jerusalem any equipment that was in excess of that allowed for under the terms of the GAA.
As well as serving as docking stations for UNSC ships, MAC stations such as Cairo Station also possess a massive coilgun, which serve to ward off assaulting enemy fleets via long-range bombardments.
A channel-access scheme is also based on a multiple access protocol and control mechanism, also known as media access control ( MAC ).
This can be done using the MAC ( Machine Access Control ) addresses from Bluetooth devices, or using the RFID serial numbers from Electronic Toll Collection ( ETC ) transponders ( also called " toll tags ").
Mac Process ( formally MAC Equipment ) is also a large employer in the area, manufacturing bulk material handling and air filtration equipment.
Ma was deputy secretary-general of the KMT from 1984 to 1988, also serving for a period as deputy of the Mainland Affairs Council ( MAC ), a cabinet-level body in charge of cross-straits relations.
The control can also detect the presence of a receiver, which allows direct communication and MAC synchronization.
The channel access control mechanisms provided by the MAC layer are also known as a multiple access protocol.
Multics, which was also developed by Project MAC, was started in the 1960s as a successor to CTSS, for future use in multiple-access computing.
ITS, the Incompatible Timesharing System ( named in comparison with the Compatible Time-Sharing System also in use at MIT ), was an early, revolutionary, and influential time-sharing operating system from MIT ; it was developed principally by the Artificial Intelligence Laboratory at MIT, with some help from Project MAC.
The MAC also offers personal trainers and specialty classes.
The MAC is also home to volleyball, fencing, and wrestling.
The offices of several of the school's varsity coaches are also in the MAC.
Four " Specialty MAC Jurisdictions " were also created to handle durable medical equipment and home health / hospice claims:
The C-5 Galaxy strategic airlifter, also inherited from MAC, is being modernized and upgraded into the C-5M Super Galaxy model.
The monitors also usually measure nitrous oxide and oxygen percentages and could give a MAC level.
The hardware unit that performs the operation is known as a multiplier – accumulator ( MAC, or MAC unit ); the operation itself is also often called a MAC or a MAC operation.

MAC and called
This feature, which is not supported by all DHCP servers, is variously called Static DHCP Assignment by DD-WRT, fixed-address by the dhcpd documentation, Address Reservation by Netgear, DHCP reservation or Static DHCP by Cisco and Linksys, and IP reservation or MAC / IP binding by various other router manufacturers.
In the following years, the Israel-Egypt MAC remained inactive, though UNTSO was occasionally called to investigate incidents involving often bedouins in the Negev.
Heavy fighting having broken out between Israel and Syria following Israeli work undertaken on Arab-owned land in the DMZ, the Security Council in Resolutions 92 ( 1951 ) and 93 ( 1951 ) of 8 and 18 May 1951 called upon the parties to cease fighting and endorsed the request of the Chief of Staff of UNTSO that the Israeli company involved be instructed to cease all operations in the DMZ until such time as an agreement is arranged through the Chairman of the MAC for continuing its project.
The local network address used in IP-Ethernet is called MAC address because it historically was part of the MAC layer in early Ethernet implementations.
The MAC layer's addressing mechanism is called physical address or MAC address.
The original 802. 11 MAC defines another coordination function called the point coordination function ( PCF ).
On 1 March 2009 Revolution released the remake of the first in their Broken Sword series, called Broken Sword: The Shadow of the Templars-Director's Cut, for Wii and Nintendo DS platforms ( later on iOS, MAC OSX and PC ).
Today's Space Shuttle ( STS ) language called HAL, ( developed by Intermetrics, Inc .) is a direct offshoot of MAC.
Fano decided to call MAC a " project " rather than a " laboratory " for reasons of internal MIT politics — if MAC had been called a laboratory, then it would have been more difficult to raid other MIT departments for research staff.
A MAC algorithm, sometimes called a keyed ( cryptographic ) hash function, accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC ( sometimes known as a tag ).
* SUSE Linux ( supported by Novell ) and Ubuntu 7. 10 have added a MAC implementation called AppArmor.
Another early device was called ARDS for Advanced Remote Display Station and originated at MIT's Project MAC.
* Non-chromogens, which includes a group of prevalent opportunistic pathogens called M. avium complex ( MAC ).
Others to follow were the Seaton Computer Center ( named for a prominent COD Board trustee ) or SCC, the Art Center ( now the McAninch Arts Center, named for the College's second President ) also called The MAC, the Student Resource Center, or SRC, and the Physical Education Building.

MAC and is
This is achieved by designating one or more " server " or " provider " nodes, either by MAC address or switch port.
This message contains the client's MAC address, the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer.
As with other IEEE 802 LANs, each Ethernet station is given a 48-bit MAC address.
< span id =" switch_vulnerabilities "> Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding .</ span >
IEEE 802. 15. 3-2003 is a MAC and PHY standard for high-rate ( 11 to 55 Mbit / s ) WPANs.
The IEEE 802. 15 Task Group 4e is chartered to define a MAC amendment to the existing standard 802. 15. 4-2006.
The intent of this amendment is to enhance and add functionality to the 802. 15. 4-2006 MAC to a ) better support the industrial markets and b ) permit compatibility with modifications being proposed within the Chinese WPAN.
The IEEE 802. 15. 4f Active RFID System Task Group is chartered to define new wireless Physical ( PHY ) layer ( s ) and enhancements to the 802. 15. 4-2006 standard MAC layer which are required to support new PHY ( s ) for Active RFID System bi-directional and location determination applications.
The low-rate mesh is built on IEEE 802. 15. 4-2006 MAC, while the high rate mesh utilizes IEEE 802. 15. 3 / 3b MAC.
IEEE 802. 3 is a working group and a collection of IEEE standards produced by the working group defining the physical layer and data link layer's media access control ( MAC ) of wired Ethernet.
* Hosts have a 48-bit node address which by default is set to the network interface card's MAC address.
As the node address is usually identical to the MAC address of the network adapter, the Address Resolution Protocol is not needed.
Beneath the LLC sublayer is the Media Access Control ( MAC ) sublayer, which is dependent on the particular medium being used ( Ethernet, token ring, FDDI, 802. 11, etc.
IEEE 802. 3 is an exception ; Ethernet originally used Ethernet II framing, with a 2-octet type field containing an EtherType value, and no 802. 2 header, but the original IEEE 802. 3 specification used a framing wherein the 2-octet field following the 6-octet destination and source MAC addresses contained a frame length, with an 802. 2 LLC header following the length field.
Interfaces can have addresses based on the MAC address of the machine ( the EUI-64 format ), but this is not a requirement.
Even when an address is not based on the MAC address though, the interface's address is ( contrary to IPv4 ) usually global instead of local, which makes it much easier to identify a single user through the IP address.
SHA-1 HMAC Generation. In cryptography, a hash-based message authentication code ( HMAC ) is a specific construction for calculating a message authentication code ( MAC ) involving a cryptographic hash function in combination with a secret cryptographic key.

0.438 seconds.