Trusted Computing

Results: 881



#Item
681Salesforce.com / Force.com / Call centre / Customer experience / Marketing / Computing / Customer experience management

Case Study SALESFORCE.COM: USING LIVEOPS® PLATFORM™ TO RUN A GLOBAL CUSTOMER SUPPORT ORGANIZATION THAT DELIVERS THE BEST CUSTOMER SERVICE EXPERIENCE Salesforce.com has helped make cloud computing a trusted way for co

Add to Reading List

Source URL: www.liveops.com

Language: English - Date: 2012-11-05 20:47:53
682Software / CAPTCHA / Password / Malware / Trusted Computing / Software as a service / Reverse Turing test / Computer security / Trusted path / Computing / Security / Computer network security

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-03-25 14:27:46
683Computer law / DADVSI / Digital rights management / Proprietary software / Software patent / Free software / Trusted Computing / Interoperability / Proprietary format / Law / Software licenses / Copyright law

PDF Document

Add to Reading List

Source URL: www.freesoftwarepact.eu

Language: English - Date: 2014-02-28 09:28:33
684Centralized computing / Cloud computing / National Strategy for Trusted Identities in Cyberspace / Information security / CA Technologies / Privacy / Identity management / Computing / Computer security / Security

PDF Document

Add to Reading List

Source URL: www.oasis-open.org

Language: English - Date: 2014-06-26 19:22:54
685National Strategy for Trusted Identities in Cyberspace / OpenForum Europe / Privacy / Internet privacy / Ethics / Cloud computing / Computing

PDF Document

Add to Reading List

Source URL: www.oasis-open.org

Language: English - Date: 2014-06-26 19:23:12
686Trusted Computer System Evaluation Criteria / Cloud computing / Common Criteria / Computer security / Computing / ITSEC

PDF Document

Add to Reading List

Source URL: events.oasis-open.org

Language: English - Date: 2011-10-12 09:39:32
687Text messaging / Email / Computing / Network protocols / United States Department of Homeland Security / Technology / Mobile technology / SMS

THE MITRE CORPORATION The Trusted Automated eXchange of Indicator Information (TAXII™) Julie Connolly, Mark Davidson, Charles Schmidt

Add to Reading List

Source URL: taxii.mitre.org

Language: English - Date: 2014-05-02 12:13:08
688ISO standards / Electronic commerce / Wireless / Ubiquitous computing / Near field communication / Trusted service manager / Mobile payment / Mobile banking / Mobile phone / Technology / Mobile telecommunications / Mobile technology

PDF Document

Add to Reading List

Source URL: www.suomenpankki.fi

Language: English - Date: 2010-11-26 02:48:22
689Adobe Systems / Graphics file formats / Nishnawbe Aski Nation / Cree language / Wawatay Native Communications Society / Cree syllabics / Portable Document Format / Adobe InDesign / WordPerfect / Software / Computing / Central Algonquian languages

RATE CARD Translation Known for quick, efficient and accurate work, Wawatay is trusted for general translations as well as complex political, health, legal and industrial (mining, forestry) documents. We translate Engli

Add to Reading List

Source URL: www.wawataynews.ca

Language: English - Date: 2011-08-29 17:01:58
690Trusted computing / FIPS 140-2 / Trusted Platform Module / FIPS 140 / Hardware security module / Trusted Computing Group / Critical Security Parameter / Microsoft CryptoAPI / IBM / Computer security / Cryptography / Espionage

Secure64 Cryptographic Module Non-Proprietary Security Policy FIPS[removed]Level 2 For Version 1.2 December 2, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-31 00:00:00
UPDATE