Search results

Jump to: navigation, search
  • ...es include [[Automatic identification and data capture|capturing data]], [[Computer data storage|data storage]], [[data analysis]], search, [[Data sharing|shar ...-v9-n10/v9n10-1.html|journal=International Journal of Modern Education and Computer Science|language=en|volume=9|issue=10|pages=1–9|doi=10.5815/ijmecs.2017.1
    110 KB (15,200 words) - 20:07, 4 November 2018
  • Thanks to technological advances in computer hardware—faster CPUs, cheaper memory, and [[Massive parallel processing|M ...cist and entrepreneur)|Jones, Roger.]], and Schutzer, Daniel, "Intelligent Security Systems," in {{cite book | author=Freedman, Roy S., Flein, Robert A., and L
    60 KB (8,537 words) - 20:08, 4 November 2018
  • ...security level, from high-security United States Penitentiaries to minimum-security federal prison camps across the United States.<ref name="sf">{{cite web|aut ...ooks and articles. Santos' wife Carole would then transcribe his work into computer format. Carole also served as a liaison with publishers.
    14 KB (1,992 words) - 20:34, 4 November 2018
  • ...s.org |publisher=WordPress.com |accessdate=January 7, 2016}}</ref> A local computer may be used for single-user testing and learning purposes. | Corrected security issues, redesigned interface, enhanced editing tools (including integrated
    47 KB (6,237 words) - 20:55, 4 November 2018
  • | Computer Science || 15 | Computer Science || 44
    164 KB (22,794 words) - 09:00, 6 November 2018
  • ...and a total of 440,000 maps, motion pictures, DVDs, sound recordings, and computer files in its collections, in addition to extensive digital resources and th ...Labor Relations Act]], the [[Fair Labor Standards Act]], and the [[Social Security Act]] while [[United States Secretary of Labor]]. [[Buckminster Fuller]] wa
    157 KB (21,777 words) - 09:01, 6 November 2018
  • ....org/web/20101016042913/http://www.yaledailynews.com/news/2010/oct/14/yale-security-votes-to-unionize-thursday/ |archivedate=October 14, 2010 |df= }} {{cite ne ...barchive|url=https://web.archive.org/web/20060205203231/https://ope.ed.gov/Security/search.asp |date=February 5, 2006 }}, Retrieved April 9, 2007.</ref> Noneth
    141 KB (19,488 words) - 09:05, 6 November 2018
  • ...as of February 4, 2011 Comcast will no longer use the service.<ref>http://security.comcast.net/certifiedemail/?cid=NET_33_1210&fss=certified%20email</ref> Another use for whitelists is [[local area network]] (LAN) security. Many network admins set up [[MAC address]] whitelists, or a MAC address fi
    12 KB (1,750 words) - 18:33, 16 November 2018
  • ...'<!--boldface per WP:R#PLA--> displayed by humans and other animals. In [[computer science]] AI research is defined as the study of "[[intelligent agent]]s": ...ts of data to improve many technologies at home and in the workplace, from security intelligence to investment analysis.
    250 KB (33,379 words) - 15:10, 21 November 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)