Computer data

Results: 44615



#Item
271Computer security / Security / Cyberwarfare / Computer network security / Data security / E-commerce / Security controls / Vulnerability / Cyber security standards / Supply chain attack

GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

Add to Reading List

Source URL: www.geoilandgas.com

Language: English - Date: 2016-08-09 11:53:34
272Computer access control / Computer security / Computing / Federated identity / Cloud standards / Data security / Open Identity Exchange / Digital identity / Identity theft / Personal /  Inc. / EIDAS / OpenID

Microsoft WordEEMA Annual Report v7.docx

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
273Computing / Statistics / Computer performance / Computer programming / Frequency / Statistical theory / Lookup table / Decimal

Some comments on the data used in Riphahn et alJim Oeppen∗ July 15, Introduction

Add to Reading List

Source URL: qed.econ.queensu.ca

Language: English - Date: 2013-07-29 09:51:48
274Abstract interpretation / Models of computation / Parallel computing / Petri net / Software engineering / Computing

Soundness of Data Flow Analyses for Weak Memory Models⋆ Jade Alglave, Daniel Kroening, John Lugton, Vincent Nimal, and Michael Tautschnig Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2012-09-10 07:41:01
275Computing / Security / Computer security / Cybercrime / Cloud infrastructure / Cloud computing / Privacy / Internet privacy / Medical privacy / Kantara Initiative

EEMA online February 2015 Issue 2 EEMA conferences Trust in the Digital World 2015: Trusting Big Data: Driving new business without

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
276Server hardware / Computing / Computer hardware / Standards organizations / Computer performance / Data transmission / IOPS / PCI Express / 19-inch rack / Datastream / Technology

TECHNICAL SPECIFICATIONS DataStream 800h HYBRID STORAGE FOR MEDIUM ENTERPRISE WORKLOADS

Add to Reading List

Source URL: www.cohodata.com

Language: English - Date: 2016-04-05 19:16:14
277Computing / Computer network security / Computer security / Technology / Fortinet / International Computer Security Association / Virtual private network / ExpressCard / DMZ / Firewall / Network switch / Comparison of firewalls

DATA SHEET FortiGate/FortiWiFi® 80C Series High Performance UTM for Small Networks

Add to Reading List

Source URL: www.boll.ch

Language: English - Date: 2016-08-04 09:36:10
278Fault-tolerant computer systems / Computing / Computer architecture / Concurrent computing / Data synchronization / State machine replication / Byzantine fault tolerance / Replication / Clientserver model / Microkernel / Server

Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun† Petros Maniatis⋆ Scott Shenker†‡ †

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
279Computing / Computer data / Data transmission / Header / Email

The Header Goes Here A Subhead Can Go Here Body Text Header Try to make your text brief and to the point. You want to convey essential information, but it is counterproductive to crowd text onto the page. Body Text

Add to Reading List

Source URL: www.sccoe.org

Language: English - Date: 2016-04-19 16:40:04
280Computing / Inter-process communication / Computer memory / Input/output / Data buffer / Synchronization / Circular buffer / Blocking / Multiple buffering / SIMPL

Lecture 23: More on Pointto-Point Communication William Gropp www.cs.illinois.edu/~wgropp Cooperative Operations for Communication

Add to Reading List

Source URL: wgropp.cs.illinois.edu

Language: English - Date: 2015-03-05 17:42:20
UPDATE