CAN

Results: 161276



#Item
31Software / Computing / Computer programming / Cross-platform software / JavaScript libraries / Npm / Node.js / PostgreSQL / JavaScript / Amber Smalltalk

How to Build the jobCent Application Using Our Developer Tools This walkthrough will guide how to build your own ​jobCent Application​. You can use this to recreate our app, or modify these steps as needed to accommo

Add to Reading List

Source URL: ncent.io

Language: English - Date: 2018-10-19 15:00:28
32Spokane /  Washington

It takes hands to build a house, but only hearts can build a home. ANNA’S HOMES

Add to Reading List

Source URL: annaschindlerfoundation.org

Language: English - Date: 2018-06-13 19:23:15
33Information technology management / Information technology / Information management / Software development / ITIL / IT service management / Change management / Release management / Business process management / Configuration management / Problem management / Book:IT Service Management

IT SERVICE MANAGEMENT (ITSM) “ A vendor’s Emotional Footprint can influence whether a client chooses to do

Add to Reading List

Source URL: www.teamdynamix.com

Language: English
34Computer access control / Bookshare / Access control / Identity management / Computer security / Password / Login / User

How-To Guide How to Set Up Student Logins Set Up Student Logins Students can read books assigned by teachers independently with Student Logins. These allow students to log in to Bookshare at school or at home and access

Add to Reading List

Source URL: www.bookshare.org

Language: English - Date: 2018-09-17 15:14:05
35Screenshot / Maintenance fee / Patent application

Step-by-Step Guide for Renewal of Certificate of Registration and Hotel-keeper’s Licence The licence expires on 31 December annually and the licence renewal exercise starts from October each year. Hotels can only submi

Add to Reading List

Source URL: www.hlb.gov.sg

Language: English - Date: 2018-10-02 22:00:42
36Women in computing / Human resource management / Alternative education / Gender disparity in computing

Position:​ Program Manager Location:​ Bay Area, CA Job Category:​ Full Time ABOUT BLACK GIRLS CODE Launched in 2011, ​Black Girls CODE​ (BGC) is devoted to showing the world that black girls can code, and do so

Add to Reading List

Source URL: www.blackgirlscode.com

Language: English - Date: 2018-09-07 16:52:28
37Economy / Finance / Money / Data management / Financial risk management / Investment management / Hedge fund / Data governance / Data quality / Business intelligence / Customer-relationship management / Productivity Alpha

Asset Management Asset management firms in both the regulated and alternative spaces face an environment of increased competition and heightened scrutiny. The firms that see the greatest success are those that can meet

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2018-07-12 13:23:52
38Voting / Keypad / Ballot / Secret ballot / Politics

Page 1 of 3 The AutoMARK Voter Assistance Terminal Operating Instructions Insert your paper ballot into the machine and it will be displayed on the screen. You can touch the screen to vote or use a Braille keypad or you

Add to Reading List

Source URL: idahovotes.gov

Language: English - Date: 2015-02-03 12:24:22
39Chemistry / Chemical elements / Native element minerals / Dietary minerals / Transition metals / Industrial gases / Ammonia / Abiogenesis / Protoplasm / Spontaneous generation / Chlorine / Sulfur

The Next Bigly Thing: Spontaneous Generation by Robert A. Nelson Q: Why did the egg cross the road? A: To get laid by a proto-chicken. And it came first... Indeed, it had to do or die -- unless life can pop into existenc

Add to Reading List

Source URL: www.rexresearch.com

Language: English - Date: 2018-02-28 23:30:59
40Denial-of-service attacks / Computer security / Cyberwarfare / Computing / Internet security / Computer network security / DDoS mitigation / System administration / Denial-of-service attack / DNS Flood / Fastly / HTTP Flood

DDoS Protection and Mitigation Powerful, real-time DDoS protection and mitigation DDoS attacks growing in size Distributed denial of service (DDoS) attacks are getting bigger and more disruptive. These attacks can outst

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2018-01-19 18:47:45
UPDATE