Access time

Results: 2452



#Item
681Identity management / Security token / Password / Authentication / Multi-factor authentication / One-time password / Strong authentication / Two-factor authentication / Password manager / Security / Computer security / Access control

Microsoft Word - Authentication Manager-39 A2 79LV 04.doc

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2013-06-26 02:06:21
682Help desk / Information technology management / Outsourcing / Automation / Customer support / Field service management / Call centre / Technical support / Call Avoidance / Marketing / Customer experience management / Business

Front-End Call Management The front-end call management feature speeds resolution time by providing immediate access to up-to-date contact information, as well as equipment, service, and contractual details. Since custom

Add to Reading List

Source URL: www.nexterna.com

Language: English - Date: 2010-04-26 08:53:29
683Internet protocols / Security token / One-time password / HOTP / Two-factor authentication / Access token / RADIUS / Citrix Systems / SecurID / Computing / Security / Computer security

Celestix_datasheet_template_hotpin_1

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-28 09:10:19
684Statistics / Prediction / ERP software / Microsoft Dynamics GP / Business software / Forecasting / Consensus forecast / Microsoft Dynamics AX / Microsoft Dynamics / Business / Statistical forecasting / Accounting software

Supply Chain Management BENEFITS Demand Planner 2.0 for Microsoft Dynamics GP Save time. Quickly access demand

Add to Reading List

Source URL: www.hrcom.com

Language: English - Date: 2009-06-30 18:00:27
685Taxation in the United States / Financial economics / Healthcare in the United States / Co-insurance / Copayment / Health insurance / Health savings account / Patient Protection and Affordable Care Act / Deductible / Insurance / Health economics / Health

: COSTCO WHOLESALE CORPORATION : Part Time Open Access® Aetna SelectSM - Summary of Benefits and Coverage: What this Plan Covers & What it Costs

Add to Reading List

Source URL: www.costcobenefits.com

Language: English - Date: 2014-12-23 19:53:30
686Cryptographic protocols / Key management / Secret sharing / Time complexity / Algorithm / Polynomial / XTR / Theoretical computer science / Applied mathematics / Mathematics

Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 08:21:27
687Teleconferencing / Electronic engineering / Computing / VoIP phone / Unified communications / Lightweight Directory Access Protocol / Videotelephony / Computer-mediated communication / Voice over IP

LiteScape Unified Communications Applications: OnCast Application Suite Time to Make the Connection

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2011-10-21 13:49:11
688Electronics / Comcast / Internet access / Internet / National Telecommunications and Information Administration / Internet in the United States / Broadband / Digital media / Technology

January[removed]Deepening Ties Comcast Internet Essentials Customers Show Broader and Deeper Ties to the Internet Over Time — Especially Among Those Who Had Digital Literacy Skills Training

Add to Reading List

Source URL: corporate.comcast.com

Language: English
689Java platform / Cross-platform software / Query languages / Java Persistence API / Hibernate / Java Persistence Query Language / TopLink / Data access object / Object-relational database / Computing / Java enterprise platform / Object-relational mapping

Java Persistence API This 3-day course covers everything you need to know to begin working with the Java Persistence API in a very short time. It covers all the important concepts necessary to access and update data sto

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-08-06 14:00:35
690Computer memory / CPU cache / Conventional PCI / Cache / Dynamic random-access memory / Interrupt / Scalable Coherent Interface / Direct memory access / Computer hardware / Computing / Computer architecture

NUMAchine Principles of Operation for System Programmers **** THIS IS A PRELIMINARY DOCUMENT. **** It is continually evolving and is subject to change at any time. Steve Caranci

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 1999-09-21 22:20:53
UPDATE