In-network management

Results: 4346



#Item
791Groupware / MDaemon / Proprietary software / Network management / Windows Server / Data synchronization / Server / Network Load Balancing / Research In Motion / Computing / Software / System software

MDaemon Messaging Server | How To Configure MDaemon for High Availability Configuring MDaemon for High Availability This document is intended to provide a general outline of the steps that are required to configure MDae

Add to Reading List

Source URL: static.altn.com

Language: English - Date: 2015-04-08 11:18:15
792Information / Data / Lift / Database / Affinity analysis / Market / Network science / Apriori algorithm / Data mining / Association rule learning / Information technology management

Market Basket Analysis with Networks Troy Raeder, Nitesh V. Chawla Interdisciplinary Center for Network Science and Applications Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 4655

Add to Reading List

Source URL: www.islab.ntua.gr

Language: English - Date: 2014-05-16 09:02:36
793National security / Computer security / Computer network security / Actuarial science / Information security / Threat / Critical infrastructure / Vulnerability / IT risk management / Security / Risk / Management

JDiBrief – Security Scenario based risk assessment for critical infrastructures: SUMMARY (1 of 5) Author: Dr Tanya Le Sage, UCL Department of Security & Crime Science In recent years democratic countries have witnessed

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2013-06-27 11:57:27
794Tōhoku earthquake and tsunami / Natural disasters / Management / Japan Overseas Cooperation Volunteers / Japan International Cooperation Agency / Emergency management / Disaster preparedness

Response to the Great East Japan Earthquake Disaster Drawing on JICA’s Knowledge, Experience and Network In response to the unprecedented catastrophe of the Great East Japan Earthquake Disaster, JICA made efforts to fu

Add to Reading List

Source URL: www.jica.go.jp

Language: English - Date: 2012-12-11 03:00:27
795Supply chain management / Systems engineering / Standards organizations / Electronic commerce / Barcodes / GS1 / Global Data Synchronization Network / Procurement / Purchasing / Business / Technology / Management

nehta June 2013 Dear Supplier, Re: Prostheses Rebate Code Updates in the National Product Catalogue Public and Private Healthcare buying organisations rely on your Prostheses Rebate Code (PRC) being up-to-date in the NPC

Add to Reading List

Source URL: www.gs1au.org

Language: English - Date: 2013-07-25 00:13:43
796Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 19:39:09
797Risk management / Computer network security / Computer security / Actuarial science / Threat / Simulation / IT risk management / Security / Risk / Management

JDiBrief – Security Scenario based risk assessment for critical infrastructures: SUMMARY (1 of 5) Author: Dr Tanya Le Sage, UCL Department of Security & Crime Science In recent years democratic countries have witnessed

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2013-06-27 11:57:57
798Water resources management / Business ethics / Social responsibility / United Nations / Environmental social science / Integrated Water Resources Management / Capacity development / United Nations Global Compact / World Business Council for Sustainable Development / Development / Environment / Sustainability

International Network for Capacity Development in Sustainable Water Management Concept Paper on Partnering with Private Sector (Revised version, August 23rd, 2013, for discussion and noting by the Management Board on Aug

Add to Reading List

Source URL: www.itpreneurs.nl

Language: English - Date: 2014-03-06 11:28:43
799Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 15:05:36
800Business / Benchmarking / Business continuity / BS 25999 / Preparedness / Disaster recovery / Business intelligence / The Benchmarking Network / Management / Data management / Strategic management

Service Spotlight: Benchmarking to Support Informed Decision-Making A number of organizations have halted or significantly curtailed their investments in preparedness measures over the past two years, which includes staf

Add to Reading List

Source URL: www.bcmanagement.com

Language: English - Date: 2010-03-19 16:16:16
UPDATE