and Security Technologies

Results: 1110



#Item
521Electric power transmission systems / Electric power distribution / Smart grid / Emerging technologies / Smart meter / Electrical grid / Feed-in tariff / Smart / Electric power transmission / Electric power / Energy / Electromagnetism

Czech Republic: Smart Grids By Hana Obrusnikova December 2011 Overview There are four key market motivators for smart grid build-out: improving reliability and security, improving

Add to Reading List

Source URL: www.buyusainfo.net

Language: English
522Cloud computing / Cloud infrastructure / Payment systems / Credit cards / Data / Basho Technologies / Riak / Payment Card Industry Data Security Standard / Distributed data store / Computing / NoSQL / Data management

CASE STUDY Riak Powers Payment Card Industry Solution Auric Systems International is a level 1 PCI DSS validated service provider and custom software development house specializing in Payment Card Industry (PCI) solutio

Add to Reading List

Source URL: media.basho.com

Language: English - Date: 2012-03-07 14:54:08
523Nuclear materials / Radiochemistry / Tritium / European Space Agency / Nuclear proliferation / Chemistry / Nuclear physics / Nuclear technology

NOVEL RUSSIAN TECHNOLOGIES FRAUD? ADDED VALUE? OR POTENTIAL SECURITY RISK? Note: This is a draft copy and is not yet a complete report. There are 60+ pages of annexes that go with this overview document. To obtain cont

Add to Reading List

Source URL: www.freeenergynews.com

Language: English - Date: 2011-01-26 14:07:33
524Crime prevention / Surveillance / French words and phrases / Law enforcement / Closed-circuit television / Privacy / Ambient intelligence / Internet privacy / Ubiquitous computing / Security / National security / Ethics

CONCEPTUAL MODELS Understanding Recording Technologies in Everyday Life Feedback about the reality of using today’s recording devices can provide

Add to Reading List

Source URL: www.gillianhayes.com

Language: English - Date: 2011-01-19 19:45:08
525Computer network security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / NTT Europe Ltd / NTT Communications Corp / Internet / Computing / Prolexic Technologies / Denial-of-service attacks / Nippon Telegraph and Telephone / Economy of Japan

SERVICE BROCHURE DDoS Protection Service from NTT Communications DDoS Protection Service (DPS) filters

Add to Reading List

Source URL: www.eu.ntt.com

Language: English
526Computing / Data security / Business continuity / Recovery time objective / Disaster recovery / Grid computing / Recovery point objective / Middleware / Backup / Management / Data management / Business

Future Technologies Grid Technology Applied to Disaster Recovery KATO Masayuki Abstract Business Grid Middleware (GMW) was developed as part of the national project led by the Ministry of Economy, Trade and Industry. A

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:37:17
527Food industry / Technology / Digital divide / Agricultural marketing / Food security / International Telecommunication Union / Market information systems / Information and communication technologies for development / Agriculture / Food and drink / Marketing

onigh CHALLENGE: USING INFORMATION AND COMMUNICATION TECHNOLOGIES TO DEVELOP AGRICULTURAL MARKETS

Add to Reading List

Source URL: globalknowledgeinitiative.org

Language: English - Date: 2012-12-27 17:29:25
528Abuse / Culture / Economics / Human rights / Law / Remote sensing / Violence / Forensic science / Human security / Ethics / Digital forensics / Science

WHITE PAPER Current Challenges: Information Communication Technologies for Human Rights Documentation Nathaniel Raymond, Director, Signal Program on Human Security and Technology, Harvard Humanitarian Initiative

Add to Reading List

Source URL: lyvoices.org

Language: English - Date: 2014-04-23 00:33:42
529Arms Trade Treaty / Nuclear proliferation / International security / Military / Nuclear weapons / International relations / Weapon of mass destruction

About this Event The rise of illicit networks facilitating the spread of all manner of contraband, including conventional weapons and dual use WMD technologies, continues to challenge both international peace and securit

Add to Reading List

Source URL: www.stimson.org

Language: English - Date: 2013-06-25 12:41:17
530Computer security / Computer network security / Social issues / Privacy / Liberty Alliance / Digital identity / Identity theft / Internet privacy / Firewall / Identity management / Identity / Ethics

Business Implications Of Liberty Technologies Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Strategic Insight Office, Sun Microsystems Inc Spokesperson and Member, Business Marketing Expert Group, Liberty

Add to Reading List

Source URL: www.hellmuthbroda.com

Language: English - Date: 2010-04-14 08:05:50
UPDATE