and Security Technologies

Results: 1110



#Item
711Humanitarian aid / Security / Urban agriculture / Agriculture / Famine / Food and drink / Sustainability / Ibadan / Environment / Development / Food security

AFRICAN FOOD SYSTEMS in the Information Age Harvesting big data, computational modeling, and information technologies for sustainable solutions to food and nutrition insecurity

Add to Reading List

Source URL: users.rcc.uchicago.edu

Language: English - Date: 2014-07-15 19:25:18
712Business / Financial institutions / Institutional investors / Land management / Technology / Food security / Agricultural extension / Cooperative extension service / Insurance / Rural community development / Agriculture / Development

BASIS Assets and Market Access Innovation Lab DISSEMINATING INNOVATIVE RESOURCES AND TECHNOLOGIES TO SMALLHOLDERS IN GHANA by Christopher Udry ([removed]), Saa Dittoh, Mathias Fosu, Dean Karlan, and Shash

Add to Reading List

Source URL: basis.ucdavis.edu

Language: English - Date: 2014-04-11 19:15:55
713Business / Financial institutions / Institutional investors / Land management / Technology / Food security / Agricultural extension / Cooperative extension service / Insurance / Rural community development / Agriculture / Development

BASIS Assets and Market Access Innovation Lab DISSEMINATING INNOVATIVE RESOURCES AND TECHNOLOGIES TO SMALLHOLDERS IN GHANA by Christopher Udry ([removed]), Saa Dittoh, Mathias Fosu, Dean Karlan, and Shash

Add to Reading List

Source URL: basis.ucdavis.edu

Language: English - Date: 2014-06-13 18:08:10
714Security sector reform / Global Alliance for Information and Communication Technologies and Development / United Nations / Politics / UN Chronicle

UNIC Library Newsletter – JAN-MARCH 2013 New websites within the UN system UN in General Index to Proceedings http://www.un.org/depts/dhl/deplib/docs/ITP/list.htm The “Index to Proceedings” (ITP) print version ceas

Add to Reading List

Source URL: unicpretoria.org.za

Language: English - Date: 2013-08-14 09:44:15
715Computer security / Juniper Networks / Companies listed on the New York Stock Exchange / NetScreen Technologies / FIPS 140-2 / FIPS 140 / Virtual private network / Cyberwarfare / Critical Security Parameter / Cryptography standards / Computing / Computer network security

Security Policy, SSG 5 and SSG 20

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
716National security / Facial recognition system / Fingerprint / Government database / Hand geometry / Biometric passport / Biometric points / Biometrics / Security / Surveillance

March[removed]Public Attitudes Toward the Uses of Biometric Identification Technologies by Government and the Private Sector

Add to Reading List

Source URL: www.search.org

Language: English - Date: 2014-10-29 10:22:37
717Emerging technologies / Genetic engineering / Environmental issues / Genetically modified food / Plant breeding / Agriculture / Recombinant DNA / Food security / Substantial equivalence / Biology / Biotechnology / Molecular biology

Safety of Genetically Engineered Foods Approaches to Assessing Unintended Health Effects Genetic engineering is one of the newer technologies available to produce desired traits in plants and animals used for food, but i

Add to Reading List

Source URL: nas-sites.org

Language: English - Date: 2012-05-24 17:40:09
718Government / America COMPETES Act / DARPA / National Institutes of Health / United States Department of Energy / Agilent Technologies / United States Department of Homeland Security / Research / Medicine / 110th United States Congress

22 Computing Research in the FY 2015 Budget Peter Harsha and Brian Mosley Computing Research Association HIGHLIGHTS

Add to Reading List

Source URL: www.aaas.org

Language: English - Date: 2014-04-22 09:48:30
719Geography of California / Science and technology in the United States / California / Lawrence Livermore National Laboratory / Livermore /  California / University of California / Pacific Northwest National Laboratory / Battelle Memorial Institute / United States Department of Energy National Laboratories / Livermore Valley

Commercializing Government Technologies: A View From Both Sides of the Table 2013 Cyber Security Division Transition to Practice (TTP) Technology Demonstrations for Investors, Integrators, and IT Companies (I3) – West

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-09-05 10:47:30
720Environment / Carbon dioxide / Carbon sequestration / Low-carbon economy / Energy development / Midwestern Governors Association / Carbon capture and storage / Renewable energy / Energy security / Energy / Technology / Energy economics

1 Introduction This advisory group document explores five unique but interrelated strategies to help drive investment in new energy related commercial technologies, firms and infrastructure in the Midwest’s new ener

Add to Reading List

Source URL: www.midwesterngovernors.org

Language: English - Date: 2011-02-22 12:21:54
UPDATE