Computer data

Results: 44615



#Item
781Security / Prevention / Safety / Cryptography / Computer security / E-commerce / Computer access control / Payment Card Industry Data Security Standard / Data security / Payment card / Multi-factor authentication / Information security

Mapping ISO27001 <> PCI-DSS 2.0

Add to Reading List

Source URL: www.forinsect.com

Language: English - Date: 2011-08-26 04:51:29
782Computing / Computer data storage / Cloud storage / Linear Tape File System / SNIA / XAM / Storage Networking Industry Association / Cloud Data Management Interface / Digital preservation / Mark Carlson / Storage area networks

PRESENTATION TITLE GOES HERE SIRF: Self-contained Information Retention Format Presenter: Sam Fineberg, HP Co-Authors: Simona Rabinovici-Cohen, IBM Research – Haifa Roger Cummings, Antesignanus

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2015-08-24 19:14:15
783Computing / Network file systems / Data management / Apache Software Foundation / Supercomputers / Lustre / Cloud storage / K computer / Clustered file system / Scalability / Object storage / Apache Spark

Scaling Spark on HPC Systems Nicholas Chaimov Allen Malony University of Oregon

Add to Reading List

Source URL: crd.lbl.gov

Language: English - Date: 2016-02-03 12:05:25
784Digital signal processing / Computer memory / Computing / Mathematical analysis / Signal processing / Fast Fourier transform / Zero-copy / Finite impulse response / Queue / Data buffer

Zero-copy Queues for Native Signal Processing Using the Virtual Memory System Gregory E. Allen, Paul E. Zucknick, and Brian L. Evans Applied Research Laboratories, and Dept. of Electrical and Computer Engineering The Uni

Add to Reading List

Source URL: users.ece.utexas.edu

Language: English - Date: 2006-11-24 21:55:39
785Computer hardware / Computing / Computer memory / Computer data storage / Non-volatile memory / Emerging technologies / Resistive random-access memory / Crossbar / Open NAND Flash Interface Working Group / Dynamic random-access memory / Cell

What’s Inside Our Totally New Approach to Storage Technology

Add to Reading List

Source URL: www.crossbar-inc.com

Language: English - Date: 2016-08-15 01:51:06
786Concurrency control / Computing / Transaction processing / Data management / Software / Software transactional memory / Transactional memory / Linearizability / Lock / Thread / Concurrent data structure / Non-blocking algorithm

Brief Announcement: Selfishness in Transactional Memory Raphael Eidenbenz Roger Wattenhofer Computer Engineering and Networks Lab

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:37
787Computing / Zip / Portable Document Format / ZIP Code / Newport /  Rhode Island / Newport /  Wales / Computer data storage / Information science

NEWPORT OREGON ZIP CODE PDF-NOZC8-WORG11 | 23 Page | File Size 1,000 KB | 23 Aug, 2016 TABLE OF CONTENT Introduction Brief Description

Add to Reading List

Source URL: woodworking-books.org

Language: English - Date: 2016-08-23 01:52:55
788Internet privacy / Privacy / Data security / Computing / Computer security / Privacy policy / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P

Privacy policy statement 1.0 Statement of Intent This is the VisitScotland website policy relating to the personal information that you may be asked to provide when using this website. This includes personal data, e-mail

Add to Reading List

Source URL: www.conventionscotland.com

Language: English - Date: 2012-10-31 10:29:53
789Parallel computing / Computing / Software engineering / Computer programming / Distributed computing architecture / MapReduce / Compiler construction / Data-intensive computing / Lexical analysis / Hash function / Data / Function

Efficient Parallel Set-Similarity Joins Using MapReduce

Add to Reading List

Source URL: asterixdb.ics.uci.edu

Language: English - Date: 2013-06-06 15:43:58
790Cyberwarfare / Computer network security / Security / Computer security / Cybercrime / Social engineering / E-commerce / Phishing / Threat / Targeted threat / Threat Intelligence Platform / Advanced persistent threat

T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-08-11 09:01:38
UPDATE