Data point

Results: 2534



#Item
591Software engineering / Computer programming / Binary arithmetic / C programming language / C++ / Typedef / IEEE 754-2008 / C++11 / Floating point / Computer arithmetic / Data types / Computing

Floating-Point Typedefs Having Specified Widths - N1703

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2013-05-20 23:44:23
592Forest ecology / Historical geology / Plants / Forests / Rainforests / Tropical rainforest / Canopy / Lamington National Park / Understory / Systems ecology / Biology / Ecosystems

“T ag number 3473, one point nine feet,” calls the measurer from his contorted position kneeling on the rainforest floor. After scanning the data sheet on her clipboard for the tag number, the

Add to Reading List

Source URL: environmentalmicro.weebly.com

Language: English - Date: 2014-07-21 06:53:01
593Electronics / Computer law / Credit cards / Data privacy / Payment systems / Plaid Pantry / Payment Card Industry Data Security Standard / Aruba Networks / Wireless access point / Computer network security / Computing / Technology

CUSTOMER CASE STUDY CLOUD | COLOCATION | MANAGED SERVICES | DATA CENTERS Regional retail chain implements a secure wireless solution to provide security and simplicity

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2014-08-26 18:54:02
594Microsoft Windows / Computer security / Computer network security / Pre-boot authentication / Check Point / Password / Windows / Encryption software / Encrypting File System / Disk encryption / Cryptographic software / Computing

Datasheet: Full Disk Encryption for Endpoint Check Point Full Disk Encryption Comprehensive data protection for endpoint hard drives

Add to Reading List

Source URL: www.esc.de

Language: English - Date: 2013-04-03 10:48:05
595Computing / Crime prevention / Information security / National security / Check Point / Security / Computer security / Data security

Understanding Security Complexity in 21st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2012-10-02 14:39:24
596Markov chain / Multivariate normal distribution / Permutation / Mixture distribution / Standard deviation / Statistics / Data analysis / Normal distribution

A Sequential Point Process Model and Bayesian Inference for Spatial Point Patterns with Linear Structures Jesper Møller & Jakob Gulddahl Rasmussen Department of Mathematical Sciences Aalborg University, Fredrik Bajersve

Add to Reading List

Source URL: people.math.aau.dk

Language: English - Date: 2010-07-22 07:47:16
597Technology / Database / Database theory / Data quality / Market data / Enterprise resource planning / Business / Information / Data management

Data Manager ZEMA Data Manager is a fully automated scheduling engine that centralizes massive volumes of external market and internally generated corporate datasets creating a single point of access for mission critica

Add to Reading List

Source URL: www.ze.com

Language: English - Date: 2015-01-30 15:08:10
598Functional programming / Data types / Type theory / Functional languages / Lisp programming language / Type class / Predicate / Function / Fixed-point combinator / Software engineering / Computer programming / Computing

PDF Document

Add to Reading List

Source URL: www.schemeworkshop.org

Language: English - Date: 2011-08-12 16:48:56
599Disk encryption / Computer network security / USB / Check Point / Deep packet inspection / USB flash drive / Backup / Universal Serial Bus / USB mass-storage device class / Computing / Computer hardware / Microsoft Windows

Datasheet: Media Encryption & Port Protection for Endpoint Check Point Media Encryption & Port Protection Comprehensive data protection and

Add to Reading List

Source URL: www.esc.de

Language: English - Date: 2013-04-03 10:48:15
600Crime prevention / National security / Data loss prevention software / Computer network security / Electronic commerce / Information security / Vulnerability / Check Point / Computer security / Security / Cyberwarfare

Low Hanging Fruit: Quick Wins with Data Loss Prevention Version 2.0 Released: March 31, 2011

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
UPDATE