Computer data

Results: 44615



#Item
521Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Monad / Option type / Type class / Map / ALGOL 68 / Functor

Advances in Programming Languages APL9: Monads and I/O Ian Stark School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-02-10 19:35:24
522Backup / Data security / Cloud storage / Computing / Backup software / Online backup services / Computer data storage

CLIENT SUCCESS STORY WHEN CRITERIA FOR SUCCESS FOUND THEIR SERVER SITTING IN A POOL OF WATER THEY KNEW THEY NEEDED A BETTER WAY TO SECURE THEIR DATA Sales improvement consultancy turns to KeepItSafe to improve their own

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
523Computer file formats / Computing / XML Data Package / Error message / Calibration / Academia / Knowledge

Software Release Notes ACECAD® Digimemo® based Handwriting Data Collection Tool: digimemo-dct 1.0 lipitk.sourceforge.net

Add to Reading List

Source URL: lipitk.sourceforge.net

Language: English - Date: 2007-09-20 03:53:46
524Visualization / Cartography / Academia / Geography / Computational science / Computer graphics / Infographics / Data / Geovisualization / Information visualization / Geoinformatics / Spatial analysis

The Cartographic Journal Vol. 42 No. 1 # The British Cartographic Society 2005 pp. 3–4

Add to Reading List

Source URL: fromto.hig.se

Language: English - Date: 2005-07-28 03:34:34
525Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
526Data security / Prevention / Safety / Security / Computer security / National security / Information privacy / Personal Information Protection and Electronic Documents Act / Privacy / Medical privacy / Internet privacy / Information security

Privacy Statement & Terms of Use Kinder Morgan Canada is firmly committed to maintaining confidentiality, respecting personal privacy, and protecting personal information. Our policy is based on the federal Personal Info

Add to Reading List

Source URL: www.kindermorgan.com

Language: English - Date: 2015-01-29 11:27:09
527Spectrometers / Computer networking / Computing / Gamma-ray spectrometer / GRS / Network packet / Gamma Ray Spectrometer / Mars Odyssey / Transmission Control Protocol / Traffic flow

Mars Odyssey GRS 2001 Gamma Data Processing VersionMARS 2001 ODYSSEY

Add to Reading List

Source URL: pds-geosciences.wustl.edu

Language: English - Date: 2004-06-22 15:53:54
528Cybercrime / Security / IID / Crime / Phishing / Computer security

New identity for new markets, new products IID adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into

Add to Reading List

Source URL: www.voxuspr.com

Language: English - Date: 2016-01-20 18:07:01
529GIS file formats / Euclidean plane geometry / Polygon / Geographic information system / USGS DEM / United States Geological Survey / PLY / Computer graphics / Geography / Physical geography / Geometry

ALTERNATIVE APPROACHES TO DISPLAY OF USGS LAND USE/LAND COVER DIGITAL DATA David J. Cowen, Michael Hodgson, W. Lynn Shirley, Thomas Wallace and Timothy White Department of Geography and

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:58:21
530Software engineering / Computer programming / Computing / Arrays / Data types / Array data type / Array data structure / C / Jagged array / For loop / Foreach loop / Array

CH07 p375:02 PM Page 375 Chapter 7

Add to Reading List

Source URL: www.buildingjavaprograms.com

Language: English - Date: 2007-02-01 14:01:30
UPDATE