| Document Date: 2010-05-02 19:30:31 Open Document File Size: 537,90 KBShare Result on Facebook
City Redmond / / Company The New York Times / Microsoft Corp. / Google / / Country United States / / Facility Pearl Harbor / / IndustryTerm authentication technologies / Online Attacks / widespread Internet connectivity / law enforcement mechanisms / supply chain / security response systems / information technology systems / Low cost computer technology / search warrants / law enforcement personnel / law enforcement execution / infrastructure services / computer technology / disrupting critical infrastructure services / / Organization End-to-End Trust / Council of Europe Convention / Department of Defense / Chinese Government / U.S. Department of Defense / / Person SCOTT CHARNEY / Steve Ragan / / Position Vice President Trustworthy Computing Group Microsoft Corporation The information / bad actor / / Product Microsoft Corporation Portable Audio Device / / ProgrammingLanguage php / / ProvinceOrState Washington / / PublishedMedium The New York Times / / Technology authentication technologies / Low cost computer technology / information technology / computer technology / / URL http /
SocialTag |