AT Internet

Results: 9334



#Item
641Ambient intelligence / Internet of things / Big data / Computer security / Cloud computing / Windows XP / Analytics

COMPUTERWORLD Digital Magazine Editorial CalendarThe dates and content of the features listed are subject to change at the discretion of the editorial team. Please send PR pitches,

Add to Reading List

Source URL: marketing.computerworld.com

Language: English - Date: 2015-09-08 11:58:49
642

INTERNET INTEREST SPARKS JAMES AUCTION SUCCESS James and Sons had a two-day sale at Fakenham Racecourse on March 30th and 31st. An unprecedented level of interest among internet bidders, of whom nearly 300 signed up, led

Add to Reading List

Source URL: aspiblog.files.wordpress.com

- Date: 2016-04-07 12:06:47
    643Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

    A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

    Add to Reading List

    Source URL: www.is.uni-muenster.de

    Language: English - Date: 2012-12-21 05:49:44
    644Computing / Cryptocurrencies / Bitcoin / Privacy / Internet privacy / Technology / Computer security / Blockchain / Information privacy / HTTP cookie / Medical privacy / Personally identifiable information

    Privacy Policy Privacy is of utmost importance at the Blockchain group of companies (“Blockchain”). We recognize the significance of protecting information which is stored on our computers or is intended to be stored

    Add to Reading List

    Source URL: www.blockchain.com

    Language: English - Date: 2015-11-11 10:39:56
    645Internet marketing / Internet advertising / Advertising

    New Algorithms for Contextual Bandits Lev Reyzin Georgia Institute of Technology Work done at Yahoo!

    Add to Reading List

    Source URL: www.levreyzin.com

    Language: English - Date: 2012-03-01 12:29:03
    646

    1 State, Restraint and the Open Internet Richard Beardsworth, Dept. of International Politics, Aberystwyth University (contact: ) A. I come at the problematic of ‘internet jurisdiction’ from an inter

    Add to Reading List

    Source URL: www.aber.ac.uk

    Language: English - Date: 2016-04-14 19:31:16
      647Computing / Technology / Computer network security / Security / Industrial Internet Consortium / Cisco Systems / Computer security / Virtual private network / Internet of things

      INDUSTRIAL INTERNET IN ACTION CASE STUDY Global Manufacturer uses remote access cybersecurity to maintain safety at its manufacturing production zones

      Add to Reading List

      Source URL: www.iiconsortium.org

      Language: English - Date: 2015-08-13 10:15:56
      648Marketing / Customer experience management / E-commerce / Marketing analytics / Internet marketing / Brand management / Touchpoint / Customer experience / Personalized marketing / Customer relationship management / Customer analytics / Consumer behaviour

      A Forrester Consulting Thought Leadership Paper Commissioned By Criteo People-Focused Marketing At The Speed

      Add to Reading List

      Source URL: www.criteo.com

      Language: English - Date: 2016-04-14 11:12:06
      649

      Drucken Hotline: +Internet: http://www.bmi.gv.at/wahlen E-Mail:

      Add to Reading List

      Source URL: www.bmi.gv.at

      Language: German - Date: 2016-03-03 03:56:12
        650

        Drucken Hotline: +Internet: http://www.bmi.gv.at/wahlen E-Mail:

        Add to Reading List

        Source URL: www.bmi.gv.at

        Language: German - Date: 2016-03-03 03:56:12
          UPDATE