Computer case

Results: 3867



#Item
291Computing / Computer security / Security / Cyberwarfare / Computer network security / Sqrrl / Cybercrime / Apache Accumulo / Computer security incident management / Threat / Graph

  DATASHEET SQRRL ENTERPRISE USE CASE: INCIDENT RESPONSE &

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-03-07 12:41:51
292Geolocation / Crime prevention / Mobile phones / Cloud clients / Tracking / Global Positioning System / Mobile phone tracking / Guardly / Mobile phone / 000 / Computer security / Emergency communication system

    Proven Solution Innovation Case Study: Improving Incident Outcomes with Mobile, Real-Time Solution for Large-Scale Campus Facilities The following case study is a demonstration of Guardly’s Enterprise Solution

Add to Reading List

Source URL: www.guardly.com

Language: English - Date: 2015-11-24 17:11:36
293Computing / Knowledge representation / Computational linguistics / Information science / Semantic Web / Linguistics / Open data / Natural language processing / BabelNet / UBY / WordNet / Linguistic Linked Open Data

Representing Multilingual Data as Linked Data: the Case of BabelNet 2.0 Maud Ehrmann1 , Francesco Cecconi1 , Daniele Vannella1 , John Mc Crae2 , Philipp Cimiano2 , Roberto Navigli1 1 Department of Computer Science, Sapi

Add to Reading List

Source URL: john.mccr.ae

Language: English - Date: 2016-02-23 09:21:41
294Computing / Computer access control / Identity management / Computer security / Federated identity / Free software / Java enterprise platform / OpenAM / ForgeRock / Toyota / Telematics / Multi-factor authentication

CASE STUDY: TOYOTA MOTOR EUROPE Toyota Motor Europe Delivers ‘Connected Car’ Experience with ForgeRock OpenAM Satellite navigation systems, smart phones, applications, and online services are rapidly improving the e

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2015-06-10 15:37:06
295Crime prevention / Cryptography / Information governance / National security / Data security / BSI Group / Information security / Professional certification / Computer security

BSI Case Study Fredrickson InternationalInformation Security Management How Fredrickson has reduced third party scrutiny and protected its reputation with ISOcertification.

Add to Reading List

Source URL: www.bsigroup.com

Language: English - Date: 2014-04-22 09:58:06
296

The case for Computer Science as an option in the English Baccalaureate BCS First Floor, Block D North Star House

Add to Reading List

Source URL: academy.bcs.org

Language: English - Date: 2012-11-15 09:53:10
    297Computing / Technology / Security / Emerging technologies / Data Distribution Service / Message-oriented middleware / Internet of things / Industrial Internet Consortium / Medical ultrasound / Computer security / SCADA / Ultrasound

    INDUSTRIAL INTERNET IN ACTION CASE STUDY BK Medical Distributed Systems for Medical Ultrasound

    Add to Reading List

    Source URL: www.iiconsortium.org

    Language: English - Date: 2015-08-13 10:16:02
    298Engineering / Systems science / Technology / Safety engineering / Systems engineering / Mixed criticality / Software engineering / Real-time computing / Software quality / Criticality / Worst-case execution time / Reliability engineering

    On the Scheduling of Fault-Tolerant Mixed-Criticality Systems Pengcheng Huang, Hoeseok Yang, Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, Switzerland

    Add to Reading List

    Source URL: www.tik.ethz.ch

    Language: English - Date: 2014-10-27 19:21:50
    299Computing / Data management / Computer data storage / Disk file systems / RAID / Data quality / Volume manager / ZFS / Fault-tolerant computer systems / Data corruption / Data integrity / File system

    End-to-end Data Integrity for File Systems: A ZFS Case Study Yupu Zhang, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Computer Sciences Department, University of Wisconsin-Madison Abstract We pre

    Add to Reading List

    Source URL: research.cs.wisc.edu

    Language: English - Date: 2010-02-04 02:31:33
    300

    The Case for a Network Protocol Isolation Layer Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA USA

    Add to Reading List

    Source URL: sing.stanford.edu

    Language: English - Date: 2014-11-10 14:32:13
      UPDATE