Computer industry

Results: 4151



#Item
251Ethology / Pharmaceutical industry / Validity / Knowledge / Agent-based model / Computer simulation / Economic model / Simulation / Verification and validation / Science / Scientific modeling / Formal methods

Verification and Validation of Agent Based Models in the Social Sciences Paul Ormerod and Bridget Rosewell, Volterra Consulting, London Abstract This paper considers some of the difficulties in es

Add to Reading List

Source URL: www.bridgetrosewell.com

Language: English - Date: 2012-07-30 09:04:11
252Data synchronization / Cloud computing / Cloud applications / Online backup services / Dropbox / Cloud storage / Computer file / Qnext / SugarSync / Software / Computing / File hosting

Media & Advertising Use Case Stay Calm and Keep Content Current In an industry where it’s the big idea that sets you apart, you must be

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-07-18 14:09:06
253Structured cabling / Computer network / Wireless / Wi-Fi / Outside plant / Internet access / Electrical wiring / Home wiring / Telecommunications Industry Association / Technology / Wireless networking / Electronic engineering

Washington University Danforth Campus Technology Overview, Standards, and Specifications Prepared By: IS&T Network Planning and Services

Add to Reading List

Source URL: facilities.wustl.edu

Language: English - Date: 2015-05-21 11:53:02
254Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-05 12:00:46
255Formal methods / Logic in computer science / Science / Validation / Applied mathematics / Verification and validation / Formal verification / Verification / Technology / Pharmaceutical industry / Validity / Systems engineering

A Comprehensive Guide for Proposers to the EU Environmental Technologies Verification Pilot Programme AdvanceETV

Add to Reading List

Source URL: www.etv-danmark.dk

Language: English - Date: 2012-09-13 06:18:03
256Electronic commerce / Credit cards / Computer law / Computing / Business / SecurityMetrics / Payment Card Industry Data Security Standard / Penetration test / PA-DSS / Payment systems / Data privacy / Computer security

SecurityMetrics External Vulnerability Scanning Criminals continually find new ways to exploit business networks and steal sensitive data. Find your business’ external network weaknesses and validate accurate security

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
257Electronic commerce / Computer network security / Cyberwarfare / Payment Card Industry Data Security Standard / Security awareness / SecurityMetrics / Penetration test / Health Insurance Portability and Accountability Act / Threat / Computer security / Security / Data privacy

SecurityMetrics Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
258Computer security / Malware / Microsoft Security Essentials / Internet security / Spyware / Computer virus / Antivirus software / System software / Software

CASE STUDY EDUCATION INDUSTRY A US-based University

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-17 01:22:12
259Credit cards / Computer law / Computing / Business / PA-DSS / Money / Payment Card Industry Data Security Standard / Transport Layer Security / SecurityMetrics / Payment systems / Electronic commerce / Data privacy

Media Contacts Lindsay Goodspeed PCI Security Standards Council +Twitter @PCISSC

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-06-01 10:29:48
260Computer security / Ubiquitous computing / Cryptography / Smart card / Philippines / International Traffic in Arms Regulations / Computer / Information security / Numerical control / Security / Technology / Political geography

Example of control items / Industry Seminar in the Philippines (Jan. 13, Examples of control items Office of International Affairs for Security Export Control, Trade and Economic Cooperation Bureau,

Add to Reading List

Source URL: supportoffice.jp

Language: English - Date: 2014-10-22 20:33:05
UPDATE