Data loss

Results: 1185



#Item
151Universal Serial Bus / IEEE / Data loss prevention software / Computer hardware / Computing / Computer security

Wave Auditor Comprehensive Endpoint Visibility Auditor – immediately recognize security risks by identifying WiFi ports or devices

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:50
152Network architecture / TCP/IP / Flow control / Internet protocols / Packet loss / Transmission Control Protocol / TCP tuning / Explicit Congestion Notification / Slow-start / Network performance / Data / Computing

Reducing Web Latency: the Virtue of Gentle Aggression Tobias Flach* , Nandita Dukkipati† , Andreas Terzis† , Barath Raghavan† , Neal Cardwell† , Yuchung Cheng† , Ankur Jain† , Shuai Hao* , Ethan Katz-Bassett*

Add to Reading List

Source URL: nsl.cs.usc.edu

Language: English - Date: 2013-05-30 13:36:04
153Boole / British people / Science and technology in the United Kingdom / English people / Computer security / George Boole / Data loss prevention software

BOOLE SERVER WINS BEST DLP SOLUTION AT SC AWARDS AND SCORES ANOTHER SUCCESS The Italian software house wins the award for “Best Data Loss Prevention solution” Milan, May 6th, 2013 – Another striking success has bee

Add to Reading List

Source URL: www.booleserver.com

Language: English - Date: 2014-12-10 19:00:00
154Incurred but not reported / Insurance

Exhibit 1 Limited Losses Amended DELAWARE COMPENSATION RATING BUREAU, INC. Table I Table I presents premium and loss data which forms the basis for calculating development

Add to Reading List

Source URL: www.dcrb.com

Language: English - Date: 2015-01-28 14:22:09
155Computer network security / Data synchronization / Crime prevention / National security / Computer security / Data loss prevention software / Dropbox / .mobi / Google / Cloud computing / Computing / Software

Top 3 data security threats Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan Sometimes we feel like we keep repeating ourselves and then we reali

Add to Reading List

Source URL: www.endpointprotector.com

Language: English - Date: 2015-05-25 06:33:07
156Information / TCP/IP / Flow control / TCP congestion avoidance algorithm / Transmission Control Protocol / Data transmission / Congestion window / Network congestion / Packet loss / Network performance / Computing / Data

The Effect of the Initial Window Size and Limited Transmit Algorithm on the Transient Behavior of TCP Transfers Urtzi Ayesta France Telecom R&D 905 rue Albert EinsteinSophia Antipolis Cedex, France

Add to Reading List

Source URL: homepages.laas.fr

Language: English - Date: 2006-03-30 03:31:58
157Insurance

Exhibit 1 Unlimited Losses $PHQGHG DELAWARE COMPENSATION RATING BUREAU, INC. Table I Table I presents premium and loss data which forms the basis for calculating development

Add to Reading List

Source URL: www.dcrb.com

Language: English - Date: 2015-01-28 14:21:59
    158Network performance / Packet loss / Internet standards / Transmission Control Protocol / Latency / TCP Vegas / Communications protocol / Internet protocols / Zeta-TCP / Data / Information / Computing

    Reducing Web Latency: The Virtue of Gentle Aggression Tobias Flach, Nandita Dukkipati, Andreas Terzis, Barath Raghavan, Yuchung Cheng, Neal Cardwell, Ankur Jain, Shuai Hao, Ethan Katz-Bassett, and Ramesh Govindan USC & G

    Add to Reading List

    Source URL: nsl.cs.usc.edu

    Language: English - Date: 2014-03-12 18:53:18
    159Occupational safety and health / Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Workplace wellness / Employee Retirement Income Security Act / Employee benefit / Patient Protection and Affordable Care Act / Wellness / Health / Law / Health promotion

    Federal Register / Vol. 80, NoMonday, April 20, Proposed Rules Code of Federal Regulations (10 CFR), ‘‘Emergency core cooling system performance during loss-of-coolant accidents (LOCA),’’ with respe

    Add to Reading List

    Source URL: www.jjkeller.com

    Language: English - Date: 2015-04-22 18:20:58
    160Computer crimes / Computing / Crime prevention / National security / Computer security / Password / Malware / Internet privacy / Computer virus / Security / Computer network security / Electronic commerce

    ■ BACK UP YOUR DATA—Even with all these security measures in place, the information on your computer is still vulnerable. Protect yourself from loss of critical data by backing up your files.

    Add to Reading List

    Source URL: www.doverfcu.com

    Language: English - Date: 2015-04-30 09:27:24
    UPDATE