Computer data

Results: 44615



#Item
531Computer memory / Computing / Computer hardware / Computer data storage / Non-volatile memory / NVDIMM / Persistent memory / SNIA / DIMM / Dynamic random-access memory / Storage Networking Industry Association / Random-access memory

NVDIMM-N Cookbook: PRESENTATION TITLE GOES HERE A Soup-to-Nuts Primer on Using NVDIMM-Ns to Improve Your Storage Performance Jeff Chang VP Marketing and Business Development, AgigA Tech

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2015-09-20 21:39:47
532Software / Visualization / Infographics / Computer graphics / User interface techniques / Computational science / Computing / Computer science / Data visualization / Interaction technique / Direct manipulation interface / 3D user interaction

041-20tvcg12-kondoindd

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
533Cartography / Geography / Map / Information system / Knowledge base / Data model / Computing / Knowledge / Geomatics / Academia

A COMMUNICATION MODEL FOR THE DESIGN OF A COMPUTER-ASSISTED CARTOGRAPHIC SYSTEM Beth Driver William Liles Technology Service Corporation

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:39:29
534Economy / Prevention / Security / National security / Actuarial science / Systemic risk / Risk / Resilience / Risk management / Computer security / Financial crisis of 20072008 / Systemically important financial institution

Risk Nexus Beyond data breaches: global interconnections of cyber risk April 2014 Contents

Add to Reading List

Source URL: www.dima.ie

Language: English - Date: 2014-06-16 14:48:06
535Real estate / Building information modeling / Construction / Software / Computer-aided design / Data modeling / Architecture / Kajima / ArchiCAD / Bim / Graphisoft

PowerPoint プレゼンテーション

Add to Reading List

Source URL: www.kenken.go.jp

Language: English - Date: 2015-04-07 01:59:30
536Computing / Security / Computer security / Data security / Crime prevention / Cryptography / National security / Information technology audit / Vulnerability / Certified Information Security Manager / Professional certification / Information security

Sean T. Malone 6810 168th St SW Lynnwood, WAMobile: Email: Personal Website: www.seantmalone.com LinkedIn: www.linkedin.com/in/seantmalone

Add to Reading List

Source URL: www.seantmalone.com

Language: English - Date: 2016-05-01 16:39:19
537Computing / Parallel computing / Computer architecture / Graphics hardware / Computational science / General-purpose computing on graphics processing units / Video game development / Operand / Computer engineering

Squeezing Energy Savings Out Of Similar Data and Computation in GPGPUs Daniel Wong University of California, Riverside ABSTRACT

Add to Reading List

Source URL: tinytocs.ece.utexas.edu

Language: English - Date: 2016-03-05 17:06:25
538Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
539Security / E-commerce / Computing / Secure communication / Crime prevention / National security / Payment Card Industry Data Security Standard / Audit / Database activity monitoring / Computer security / Linoma Software / Aveksa

For Immediate Release Enforcive Releases Cross-Platform Compliance Product (Hackensack, New Jersey and Herzliyah, Israel- October 2, 2014) Enforcive, a leading provider of cross platform security software, announced the

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2014-10-05 00:00:54
540Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE