Usage data

Results: 884



#Item
441Demand response / Electrical grid / Time-based pricing / Data center / Concurrent computing / Distributed computing / Computing

Turn customer usage data into actionable information. ® PowerLogic ®

Add to Reading List

Source URL: www.powerlogic.com

Language: English - Date: 2009-07-30 08:54:17
442Computer security / Public safety / Data security / Information security / Password / Credit card / Security / National security / Crime prevention

       Technology  Usage  Policy   P-­‐01-­‐2   V1.3  -­‐     2015-­‐02-­‐03

Add to Reading List

Source URL: www.shu.edu

Language: English - Date: 2015-02-03 14:36:49
443Data types / Type theory / Binary decision diagram / Boolean algebra / Diagrams / Model checking / Function / Variable / Type system / Mathematics / Mathematical logic / Software engineering

LNCS[removed]Domain Types: Abstract-Domain Selection Based on Variable Usage

Add to Reading List

Source URL: www.infosun.fim.uni-passau.de

Language: English - Date: 2013-10-30 13:54:10
444Internet privacy / Digital media / Identity management / Social issues / P3P / World Wide Web / Privacy policy / Information privacy / Gmail / Computing / Privacy / Ethics

Usage Restriction Management for Accountable Data Transfer on the Web Oshani Seneviratne and Lalana Kagal Decentralized Information Group MIT Computer Science and Artificial Intelligence Lab {oshani, lkagal}@csail.mit.ed

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-03-01 08:07:27
445Computing / Computer file formats / Graphics file formats / Digital photography / Data management / Exchangeable image file format / File format / Portable Document Format / Computer file / Information / Data / Metadata

Monthly Newsletter – Issue No[removed]Metadata – Usage and Security Concerns Metadata is data that describes another piece of data. Metadata can be found in almost every type of digital files, such as your pictures

Add to Reading List

Source URL: www.gosafeonline.sg

Language: English - Date: 2014-10-27 05:43:42
446Privacy / HTTP / HTTP cookie / NPPA / Ethics / Internet privacy / Computing

Online Privacy Statement Protecting your private information is our priority. This Statement of Privacy applies to ww.nepork.org and Nebraska Pork Producers Association and governs data collection and usage. For the purp

Add to Reading List

Source URL: www.nepork.org

Language: English - Date: 2012-03-14 08:18:34
447Sports / Avalanche / Backcountry skiing / Ski touring / Mountaineering / Backcountry / Skiing / Ski mountaineering / Snowshoe / Snow / Meteorology / Atmospheric sciences

Proceedings, International Snow Science Workshop, Banff, 2014 PATTERNS OF RECREATIONAL BACKCOUNTRY USAGE - ANALYZING DATA FROM SOCIAL MEDIA MOUNTAINEERING NETWORKS AND AVALANCHE STATISTICS 1* 1

Add to Reading List

Source URL: www.slf.ch

Language: English - Date: 2014-10-06 04:01:28
448Computer network security / Internet / Network performance / Proxy server / Data transmission / Proxy list / Internet censorship circumvention / Open proxy / Computer networking / Computing / Internet privacy

Detecting Anonymous Proxy Usage John Brozycki March 2008 GIAC GPEN, GCIH, GSEC, GCIA, GCFW, GCFA, GREM [removed]

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:05
449Energy / Energy conservation / Computers and the environment / Mechanical engineering / Electric power / Data center / Energy Star / Air conditioner / Power usage effectiveness / Technology / Heating /  ventilating /  and air conditioning / Computing

Increase Your Data Center Energy Efficiency • Increase Your Data Center Energy Efficiency • Increase Your Data Center Energy Efficiency • Increase Your Data Center Energy Efficiency • Increase • Benchmark exis

Add to Reading List

Source URL: www.gsa.gov

Language: English - Date: 2010-06-11 03:57:27
450ISCSI / ZFS / Storage area network / FreeNAS / Solid-state drive / EMC Symmetrix / Storage virtualization / Computing / Computer storage / FreeBSD

Copyright © 2013 iXsystems, Inc. All rights reserved. “ Managing our in-house storage was requiring a lot of manual work. We were constantly having to monitor our data usage, having to put data onto external drives.

Add to Reading List

Source URL: www.ixsystems.com

Language: English - Date: 2014-12-09 15:34:39
UPDATE