Event data

Results: 1868



#Item
621Transmission Control Protocol / Timestamp / Privacy / Internet privacy / Ethics / Data privacy / Differential privacy

Differentially Private Event Sequences over Infinite Streams Georgios Kellaris1 Stavros Papadopoulos2 1 HKUST {gkellaris, dimitris}@cse.ust.hk

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-07-17 12:55:57
622Mobile telecommunications / Videotelephony / Deutsche Telekom / Ministry of Transport and Communication / Türk Telekom / T-Mobile / Avea / Turkcell / Vodafone / Technology / Mobile technology / Electronic engineering

ELECTRONIC COMMUNICATIONS MARKET IN TURKEY MARKET DATA[removed]Q1)* * In the event of any discrepancy, the original report in Turkish shall prevail.

Add to Reading List

Source URL: eng.btk.gov.tr

Language: English - Date: 2013-09-02 11:54:04
623McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Security / Information technology management / Database audit / Security event manager / Database / Stored procedure / Computer security / Database management systems / Computing

Data Sheet McAfee Database Event Monitor for SIEM Gain visibility into database transactions without impacting performance.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-29 21:17:37
624Media bias / Data quality / Data analysis / Mark and recapture / Science / Particle physics / Iraq War casualties

No News is Good News?: Mark and Recapture for Event Data When Reporting Probabilities are Less than One. Cullen S. Hendrix Korbel School of International Studies University of Denver

Add to Reading List

Source URL: www.du.edu

Language: English - Date: 2014-09-09 15:23:05
625Mobile telecommunications / Videotelephony / Ministry of Transport and Communication / Türk Telekom / Avea / Turkcell / Vodafone / SMS / 3G / Technology / Mobile technology / Electronic engineering

ELECTRONIC COMMUNICATIONS MARKET IN TURKEY MARKET DATA[removed]Q4)* * In the event of any discrepancy, the original report in Turkish shall prevail.

Add to Reading List

Source URL: eng.btk.gov.tr

Language: English - Date: 2014-03-20 09:10:27
626Spotfire / Information technology / Data collection / Business intelligence tools / Analytics / Business intelligence / Business / Tibco Software

D ATA S H E E T Spotfire Event Analytics Transform your business operations “Spotfire Event Analytics helps us analyze millions of events

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2014-04-25 05:28:57
627McAfee / Network management / System administration / Data security / Security information and event management / Security event manager / Log analysis / Syslog / Payment Card Industry Data Security Standard / Computing / Information technology management / Computer security

Data Sheet McAfee Enterprise Log Manager Reduce compliance costs with automated log collection,

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-13 18:46:38
628Cyberwarfare / Data security / Security information and event management / National security / Database activity monitoring / Threat / Targeted threat / McAfee / Security event manager / Computer security / Security / Computer network security

Special Report When Minutes Count How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-16 13:56:32
629System software / System administration / Data security / Network management / Security information and event management / Unisys / Burroughs MCP / Security event manager / Syslog / Computer security / Computing / Information technology management

Protecting Your Business Security with Locum RealTime Monitor By: Locum Software Services Limited White Paper

Add to Reading List

Source URL: www.locumsoftware.co.uk

Language: English - Date: 2015-02-02 06:10:21
630Cyberwarfare / Data security / Security information and event management / National security / Database activity monitoring / Threat / Targeted threat / McAfee / Security event manager / Computer security / Security / Computer network security

Special Report When Minutes Count How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-16 13:56:32
UPDATE