and Security Technologies

Results: 1110



#Item
191Cloud infrastructure / Hadoop / Apache Hadoop / Parallel computing / Emerging technologies / MapR / Big data / Data Intensive Computing / Computing / Cloud computing / Concurrent computing

Hadoop Data Access on Your Terms™ BlueTalon Solution Brief Are Data Access and Security Issues Slowing Your Adoption of Hadoop?

Add to Reading List

Source URL: bluetalon.com

Language: English - Date: 2015-06-08 21:23:04
192Foreign trade of India / Directorate General of Foreign Trade / Ministry of Commerce and Industry / Identifiers / Military technology / United States Department of Commerce / Export / Wassenaar Arrangement / EXIM / Law / International relations / Government

Export and Import of Security Technologies in India: Q&A By: Elonnai Hickok Does India have standards regulating the export of technologies that can be used for surveillance purposes?

Add to Reading List

Source URL: cis-india.org

Language: English
193Public safety / United States Department of Homeland Security / War on Terror / Counter-terrorism / Homeland Security Act / Homeland security / Definitions of terrorism / Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) / Intelligence Reform and Terrorism Prevention Act / National security / Security / Terrorism

Employment Screening Enterprise Edition “SAFETY Act Designated” by the U.S. Department of Homeland Security. Employment Screening Enterprise Edition is one of the first

Add to Reading List

Source URL: www.fadv.com

Language: English - Date: 2014-02-27 16:39:12
194Technology / Internet / Acceptable use policy / Etiquette / Internet culture / Password / Information security / Information and communication technologies in education / Email / Computing / Computer security

Student AUP* Code of Practice (*ICT Acceptable Use Policy) Effective from 13 January 2014 Version Number: 3.0

Add to Reading List

Source URL: www.salford.ac.uk

Language: English - Date: 2014-01-13 07:21:46
195Public safety / Management / Prevention / Framework Programmes for Research and Technological Development / Resilience / Psychological resilience

ELASSTIC Enhanced Large Scale Architecture with Safety and Security Technologies and special Information Capabilities The EC FP7 funded research project ELASSTIC has an overall aim to improve the security and

Add to Reading List

Source URL: www.elasstic.eu

Language: English - Date: 2015-05-01 08:40:26
196Visual arts / Revit / Psychological resilience / Building information modeling / Construction / Architecture

ELASSTIC Enhanced Large Scale Architecture with Safety and SHOWCASE PROJECT Security Technologies and special Information Capabilities

Add to Reading List

Source URL: www.elasstic.eu

Language: English - Date: 2015-05-01 08:40:33
197Computational linguistics / Automatic identification and data capture / Artificial intelligence applications

Technologies for information mining from speech for security and commercial applications Information mining

Add to Reading List

Source URL: www.spolupraceroku.cz

Language: English - Date: 2014-02-03 06:06:15
198Crime prevention / National security / Public safety / Computer security / Electronic commerce / Internet privacy / Password / Information security / Information privacy / Security / Ethics / Privacy

Privacy Policy Summary of MTM Privacy Policy MTM Technologies, Inc. (the “Company” or “MTM”,) Privacy Policy is a statement that discloses some or all of the ways MTM gathers, uses, discloses and manages MTM cust

Add to Reading List

Source URL: www.mtm.com

Language: English - Date: 2014-11-19 15:21:36
199Emerging technologies / Environmental issues / Herbicides / Genetically modified organism / Genetically modified food / Genetically modified plant / Agriculture / Glyphosate / Roundup / Biology / Genetic engineering / Molecular biology

THE SCIENCE Anti-GMO Activism and its Impact on Food Security Kevin M. Folta Professor and Chairman, Horticultural Sciences Department, University of Florida A PATH FORWARD:

Add to Reading List

Source URL: www.geneticliteracyproject.org

Language: English - Date: 2015-01-07 22:18:33
200Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:24:01
UPDATE