Data corruption

Results: 301



#Item
1BETTER DATA TO MONITOR VIOLENCE, TRAFFICKING, CORRUPTION AND ACCESS TO JUSTICE 2017

BETTER DATA TO MONITOR VIOLENCE, TRAFFICKING, CORRUPTION AND ACCESS TO JUSTICE 2017

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2017-06-07 06:08:53
    2Understanding and Mitigating Packet Corruption in Data Center Networks Danyang Zhuo Monia Ghobadi

    Understanding and Mitigating Packet Corruption in Data Center Networks Danyang Zhuo Monia Ghobadi

    Add to Reading List

    Source URL: ratul.org

    Language: English - Date: 2018-08-11 02:14:56
      3SECURITY The value of data is increasing, but so is the cost of protecting this data. Data stored online is susceptible to compromise and vulnerable to corruption threats. It can be accidental, such as a natural disaster

      SECURITY The value of data is increasing, but so is the cost of protecting this data. Data stored online is susceptible to compromise and vulnerable to corruption threats. It can be accidental, such as a natural disaster

      Add to Reading List

      Source URL: www.lto.org

      Language: English - Date: 2016-02-18 18:42:59
      4BANGKOK - DEC 9: Many 5 milion people walked for anti government corruption on Jun 09, 2013 in Bangkok, Thailand. The protesters required  Yingluck Shinawatra Prime Minister resign.

      BANGKOK - DEC 9: Many 5 milion people walked for anti government corruption on Jun 09, 2013 in Bangkok, Thailand. The protesters required Yingluck Shinawatra Prime Minister resign.

      Add to Reading List

      Source URL: www.thegovlab.org

      Language: English - Date: 2016-08-23 15:47:20
      5igdr_gdr_corrupt_CLASS_files

      igdr_gdr_corrupt_CLASS_files

      Add to Reading List

      Source URL: www.class.ncdc.noaa.gov

      Language: English - Date: 2012-03-28 11:25:12
      6Microsoft Word - AIAL 2012 Conference Paper Chris Field Final

      Microsoft Word - AIAL 2012 Conference Paper Chris Field Final

      Add to Reading List

      Source URL: www.ombudsman.wa.gov.au

      Language: English - Date: 2014-06-11 04:26:51
      7Detecting Data Errors: Where are we and what needs to be done? ∗ Ziawasch Abedjan§ Xu Chu` Dong Deng‡ Raul Castro Fernandez§ Ihab F. Ilyas`

      Detecting Data Errors: Where are we and what needs to be done? ∗ Ziawasch Abedjan§ Xu Chu` Dong Deng‡ Raul Castro Fernandez§ Ihab F. Ilyas`

      Add to Reading List

      Source URL: cs.uwaterloo.ca

      Language: English - Date: 2016-07-21 22:07:31
      8OPEN DATA’S IMPACT  OPEN CONTRACTING AND PROCUREMENT IN SLOVAKIA Establishing Trust in Government Through Open Data

      OPEN DATA’S IMPACT OPEN CONTRACTING AND PROCUREMENT IN SLOVAKIA Establishing Trust in Government Through Open Data

      Add to Reading List

      Source URL: odimpact.org

      Language: English - Date: 2016-05-24 16:32:21
      9Spin and secrecy in the Caribbean How ex-England cricket star Phil Edmonds used anonymously-owned shell companies and tax havens to rip off investors1 May 2016 This is a story about how anonymously-owned companies can be

      Spin and secrecy in the Caribbean How ex-England cricket star Phil Edmonds used anonymously-owned shell companies and tax havens to rip off investors1 May 2016 This is a story about how anonymously-owned companies can be

      Add to Reading List

      Source URL: www.globalwitness.org

      Language: English
      10Security »	 Easily stored offline to protect against on-line data corruption »	 Easily stored offsite in case of a disaster recovery situation »	 Hardware based data encryption for added data security » 	WORM cartrid

      Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

      Add to Reading List

      Source URL: www.lto.org

      Language: English - Date: 2014-09-08 23:24:42