Business and Computing

Results: 9354



#Item
621Business / Internet of Things / Internet privacy / Information privacy / Consumer privacy / Privacy / Ethics / Computing

D. A. Baker Human and Social Dimensions of Science and Technology, PhD student ASU Consortium for Science, Policy and Outcomes Submission for Governance of Emerging TechnologiesThe Internet of Things, privacy, and

Add to Reading List

Source URL: conferences.asucollegeoflaw.com

Language: English - Date: 2015-03-05 16:28:36
622Computing / Internet / HTTP cookie / Information privacy / P3P / FTC Fair Information Practice / Internet privacy / Privacy / Ethics

Acorn Insurance Business Privacy Policy This privacy policy sets out how Acorn Insurance uses and protects any information that you give them when you use this website. Acorn Insurance is committed to ensuring that your

Add to Reading List

Source URL: www.acorninsure.co.uk

Language: English - Date: 2012-08-22 06:28:42
623Business / Auction / Secure multi-party computation / Trusted third party / Universal composability / Vickrey auction / Online auction business model / Bid / Cryptography / Auction theory / Auctioneering / Cryptographic protocols

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
624Bank card number / Card security code / Email / Business / Technology / Computing / Merchant services / Electronic commerce / Credit card

To make a cash donation, print and complete this form and mail it with your check or credit card information to The Wildlands Conservancy (TWC) at the address below.  $1000

Add to Reading List

Source URL: www.wildlandsconservancy.org

Language: English - Date: 2012-12-12 11:28:36
625Electronic commerce / Credit cards / Computer law / Computing / Business / SecurityMetrics / Payment Card Industry Data Security Standard / Penetration test / PA-DSS / Payment systems / Data privacy / Computer security

SecurityMetrics External Vulnerability Scanning Criminals continually find new ways to exploit business networks and steal sensitive data. Find your business’ external network weaknesses and validate accurate security

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
626Systems engineering / Google / Computing / Technology / Supply chain management / Business / Procurement

Spend Matters Network TM More than just one site—find out who’s reading us around the world and discover just how influential the Spend Matters Network of sites really are!

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-06-30 12:20:22
627Information technology management / Business / Printer / Typography / Portable Document Format / Document management system / Workflow / Internet fax / Fax / Technology / Office equipment / Computing

Powerful PerforMaNce , eNhaNced oPerability, eNergy efficieNt MX-2610N MX-3110N MX-3610N Drag and drop touch control for intuitive operation!

Add to Reading List

Source URL: www.equipmybiz.com

Language: English - Date: 2014-10-01 17:18:17
628Business intelligence / Mobile device management / Cloud computing / Mobile Web / Mobile application development / Provisioning / Mobile business intelligence / Mobile enterprise application platform / Computing / Technology / Software engineering

Customer Cloud Architecture for Mobile Executive Overview This paper describes vendor neutral best practices for hosting the services and components required to support mobile apps using cloud computing. The architectura

Add to Reading List

Source URL: cloud-council.org

Language: English - Date: 2015-05-28 16:45:44
629Technology / Cloud clients / Mobile application development / Android / App Store / .mobi / Windows Phone / Mobile business intelligence / Mobile operating system / Computing / Smartphones / Software

Mobile Apps & Strategy For the Enterprise HOW TO LAUNCH NEW MOBILE PROJECTS AT YOUR COMPANY 2014 is the year that every company needs a mobile strategy. However, it can be difficult to design and launch mobile applicatio

Add to Reading List

Source URL: www.qubop.com

Language: English - Date: 2014-11-22 16:56:50
630Privacy / Email / Identity management / Law / Internet privacy / In re Gateway Learning Corp. / P3P / Ethics / Computing / Internet

Business privacy policy – Mixing Digital Ltd This privacy policy sets out how Mixing Digital Ltd uses and protects any information that you give Mixing Digital Ltd when you use this website or newsletter service. Mixi

Add to Reading List

Source URL: www.mixingdigital.co.uk

Language: English - Date: 2011-02-22 10:07:36
UPDATE