Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
5601Publicado 2010“…Relative costs and impacts, the role of institutional arrangements and actors, as well as approaches for linking hygiene behavior change and sanitation demand creation (so called software investments) with hardware investments are examined. Finally, considerations and opportunities for development banks and other financing agencies to become engaged in the scale-up of hygiene behavior change and sanitation demand creation approaches which have demonstrated success are presented. …”
Electrónico -
5602Publicado 2020“…. ; i 4) un cas d’estudi sobre la tecnologia White Rabbit, un hardware sofisticat de codi obert desenvolupat al Consell Europeu per a la Recerca Nuclear (CERN) en col·laboració amb un extens ecosistema d’empreses…”
Accés lliure
Tesis -
5603Publicado 2021“…This year, we will have two exciting keynote talks, reflecting emerging topics of great interest to the data management community: "Utilizing (and Designing) Modern Hardware for Data- Intensive Computations: The Role of Abstraction" by Kenneth A. …”
Libro electrónico -
5604Publicado 2022“…If you want a job in IT, especially network hardware or software, and you don’t know IPv6, you are already obsolete. …”
Libro electrónico -
5605Publicado 2022“…Topics include: How to install and configure Zoom Choosing whether or when to use the Zoom web app Configuring your physical setup and hardware for best audio and video quality Mastering meeting participation, including the various methods of "speaking up" Zoom's many mobile and desktop views for seeing other people and shared screens The best ways to present using PowerPoint and Keynote Finding the best combination of screens and devices to manage each of your presentations Becoming a host and starting meetings with one other person or 1,000 Conducting polls and managing breakout rooms Using automatic transcription and captioning features How to preserve your privacy when sharing apps, presentations, or other parts of your screen Recording a meeting for later playback, presentation, or a podcast Deciding whether to upgrade to a paid Zoom tier for meetings you host Zoom's security options, including end-to-end encryption How co-host and alternate host roles work in managing a meeting…”
Libro electrónico -
5606por Association for Computing Machinery“…Our conference is the venue to discuss all those innovations in many different areas including design, software, hardware, understanding of use, and applications or deployments of interactive surfaces and spaces. …”
Publicado 2016
Libro electrónico -
5607por Association for Computing Machinery“…Our conference is the venue to discuss all those innovations in many different areas including design, software, hardware, understanding of use, and applications or deployments of interactive surfaces and spaces. …”
Publicado 2016
Libro electrónico -
5608Publicado 1997“…Often, administration at the local institution is not aware of the resources, course offerings, computing hardware, software, and laboratory resources needed for a viable program. …”
Libro electrónico -
5609Publicado 2022“…Anticipate Apple's potentially privacy-challenging changes designed to improve the safety of children, both those using Apple hardware and those who suffering abuse. Optimize cellular data use to avoid throttling or overage charges, while always getting the best throughput. …”
Libro electrónico -
5610Publicado 2018“…Balancing this societal and humanistic goal with the continuous evolution of technology, both in hardware and software, requires the multidisciplinary view that the HRI conference offers. …”
Libro electrónico -
5611Publicado 2022“…He has practical hands-on experience in many aspects of HPC, including hardware and software design, benchmarking, storage, GPU, cloud, and parallel computing. …”
Video -
5612Publicado 2018“…Balancing this societal and humanistic goal with the continuous evolution of technology, both in hardware and software, requires the multidisciplinary view that the HRI conference offers. …”
Libro electrónico -
5613Publicado 2020“…Making a city resilient requires the implementation of complex infrastructural and organizational interventions which must take into account the multiplicity and dynamism of the urban components involved, and which therefore must make use of the most recent technologies, hardware and software. Taking action on urban resilience can also enable cities to achieve a better level of smartness. …”
Libro electrónico -
5614Publicado 2002“…During this period huge strides have also been made in the development of hardware for computing devices. The Southern African region did not escape these developments. …”
Libro electrónico -
5615Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
5616Publicado 2020“…In this talk, Shuicheng will introduce the research and development efforts in designing neural networks from two orthogonal perspectives: on how these models are bio-inspired and on how these models are more hardware-friendly to motivate the design of next-generation AI chips. …”
Libro electrónico