Data integrity

Results: 897



#Item
221Named graph / Dereferenceable Uniform Resource Identifier / Linked data / Resource / RDFa / Uniform resource identifier / FOAF / SPARQL / VoiD / Semantic Web / Computing / World Wide Web

Preserving Linked Data on the Semantic Web by the application of Link Integrity techniques from Hypermedia Rob Vesse, Wendy Hall, Leslie Carr Intelligence, Agents & Multimedia Group School of Electronics & Computer Scien

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2010-04-21 11:01:22
222Data warehouse / Data cleansing / Guidewire Software / Data quality / Data integration / Data architecture / Data integrity / Database / Data model / Data management / Information / Data

DataHub Challenge: Information trapped in silos P&C carriers have large amounts of data stored within core systems, ancillary systems, and data warehouses. This data is the lifeblood of the enterprise, used to support co

Add to Reading List

Source URL: www.guidewire.com

Language: English - Date: 2013-06-02 10:31:25
223Statistics / Runoff model / Spatial analysis / Geographic information system / Hydrological modelling / Data integrity / Rain / Surface runoff / Time series / Hydrology / Water / Earth

Hydrosanity: a Starting Point for Hydrological Analysis Andrews, F.T. 1, 2 1 Integrated Catchment Assessment and Management Centre (iCAM), Fenner School of Environment and Society, The Australian National University, Can

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-01-16 19:51:28
224SQL / Database management systems / Databases / Data modeling / Database trigger / Foreign key / Referential integrity / Data validation / Data integrity / Data management / Computing / Data quality

Chapter 5 Rules, Triggers and ­Referential Integrity Page 71

Add to Reading List

Source URL: www.hentzenwerke.com

Language: English - Date: 2009-11-08 15:18:20
225Evaluation / Crime prevention / National security / Public safety / CACI / Department of Defense Information Assurance Certification and Accreditation Process / Medical informatics / Certification and Accreditation / Accreditation / Computer security / Security / Quality assurance

CACI Information Solutions and Services CACI Health Information Assurance Solutions Ensuring the Integrity of Healthcare Systems and Patient Data

Add to Reading List

Source URL: www.caci.com

Language: English - Date: 2015-04-03 09:55:56
226Object-oriented programming / Virtual method table / Data types / Software bugs / Select / Pointer / Buffer overflow protection / Dynamic-link library / Fortran / Computing / Software engineering / Computer programming

VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang∗ , Chengyu Song‡ , Kevin Zhijie Chen∗ , Zhaofeng Chen† , Dawn Song∗ ∗ University of California, Berkeley {chaoz, kevinchn, dawnsong}@cs.berkel

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:00:50
227File integrity monitoring / Business / Technology / Intel / Payment Card Industry Data Security Standard / McAfee VirusScan / Host Based Security System / McAfee / Computing / Companies listed on the New York Stock Exchange

Data Sheet McAfee Change Control Prevent unauthorized changes, automate regulatory compliance controls

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-15 15:26:17
228Computer security / Computing / Computer network security / Companies listed on the New York Stock Exchange / Zero-day attack / Malware / Host Based Security System / Check Point Integrity / McAfee / Software / Antivirus software

Data Sheet McAfee Endpoint Protection— Advanced Suite

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-25 17:38:37
229GoToAssist / GoToMeeting / GoToMyPC / Citrix Systems / Citrix Online / Gramm–Leach–Bliley Act / Information security / Internet privacy / Privacy / Remote desktop / Remote administration software / Computing

Guide GoToAssist Corporate Gramm-Leach-Bliley Act compliance guide Protection, privacy and remote access Protecting the integrity of your company network and the privacy of sensitive data is of utmost concern to any ent

Add to Reading List

Source URL: www.gotoassist.com

Language: English - Date: 2015-03-13 17:00:49
230Management / Data management / Public safety / Computer-aided dispatch / National Wildfire Coordinating Group / Dispatch / Microsoft SQL Server / Data integrity / Wildland fire suppression / Logistics / Firefighting in the United States

Record of Decision Date: March 4, 2015 Subject: Approval – WildCAD 6.0 Roll Out Introduction/Background: The interagency wildland fire community is currently using WildCAD in most of the local Initial Attack (Tier 3) D

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2015-04-08 16:09:06
UPDATE