Data loss

Results: 1185



#Item
161Data security / Computer storage media / Computer storage / Computer data / Data management / Data remanence / Data recovery / Disk formatting / Backup / Computing / Information / Data

A note on recovery of data from overwritten areas of magnetic media Fred Cohen – CEO / Management Analytics / http://manalytic.com/ My background in this area The first time I encountered data loss and recovery effects

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-09-19 10:39:13
162Data / Information / Data security / Computer data / Computer file / Inter-process communication / Data loss prevention software / Information security / Data loss / Data management / Computer security / Computing

C O NTR O LL ED FI LE PR O T E CTI ON WITH IN T HE P ERI ME TER AND B EY OND – A N ETI Q S O LU TI ON BRI EF In today’s vibrant business environment the information security paradigm has changed dramatically. It is

Add to Reading List

Source URL: techarbor.com

Language: English - Date: 2015-05-19 05:03:30
163Environmental chemistry / Ozone depletion / Disinfectants / Gases / Oxygen / Ozone / Data assimilation / Atmospheric sciences / Meteorology / Chemistry

Polar Ozone Loss and the Tropical Tropopause Layer Research based on meteorological fields from data assimilation systems Markus Rex

Add to Reading List

Source URL: ee.nmt.edu

Language: English - Date: 2012-08-06 09:10:54
164Human–computer interaction / Identification / Animal identification / Wireless / Microchip implant / Animal loss / Virbac / Radio-frequency identification / Automatic identification and data capture / Technology

Pet reunification system Today, more and more governments throughout the world are introducing laws to make electronic identification of companion animals mandatory. This is accomplished by implanting tiny RFID transpond

Add to Reading List

Source URL: www.datamars.com

Language: English - Date: 2013-05-24 11:42:39
165Bayesian statistics / Bayesian inference / Statistical models / Prior probability / Bayes estimator / Maximum a posteriori estimation / Maximum likelihood / Statistical inference / Probability box / Statistics / Statistical theory / Estimation theory

Loss Distribution Estimation, Scenario Data and Bayesian Inference

Add to Reading List

Source URL: www.bostonfed.org

Language: English - Date: 2007-11-20 17:27:49
166Cloud storage / Software / Remote backup service / Backup / Online backup services / Computer data / Data loss / Data center / Uranium Backup / Computing / Backup software / Data security

White Paper: Data Backup By: Doug Zbikowski Ensure Data Security with Online Backup Reasons to Secure your Data

Add to Reading List

Source URL: www.toast.net

Language: English - Date: 2012-10-29 11:37:06
167Medical specialties / Audiology / Neuroprosthetics / Cochlear implant / House Ear Institute / Neurotology / Sensorineural hearing loss / Hearing impairment / Cochlear nerve / Medicine / Otology / Otolaryngology

Curriculum Vitae AHMED A. SAADA, M.D., F.I.C.S. Biographical Data E-mail:

Add to Reading List

Source URL: www.waent.org

Language: English - Date: 2013-08-10 12:24:29
168Data transmission / Network congestion / Packet loss / Transmission Control Protocol / TCP congestion avoidance algorithm / Explicit Congestion Notification / Queuing delay / Router / Random early detection / Network performance / Computing / Network architecture

1 Scalable TCP Congestion Control Robert Morris Harvard University

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-19 14:36:20
169Database / Unstructured data / Data management / Computing / Business / Computer security / Data loss prevention software / Websense

Securosis, L.L.C. Understanding and Selecting a Data Loss Prevention Solution This Report Sponsored By

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
170Data / Online chat / Data transmission / Videotelephony / Packet loss / Wavelet / Network packet / Communications protocol / Instant messaging / Computing / Network performance / Information

Who are You Talking to? Breaching Privacy in Encrypted IM Networks Muhammad U. Ilyas Department of EE, SEECS National University of Sciences & Technology Islamabad – 44000, Pakistan

Add to Reading List

Source URL: webscope.sandbox.yahoo.com

Language: English - Date: 2013-08-27 17:43:00
UPDATE