• Demanding fewer bugs in government-bought software could reduce the vulnerabilities that have allowed hackers to breach agencies and companies without requiring any new monitoring or information sharing system that might affect privacy.

    FORBES: President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy

  • With Microsoft, for example, Cisco built a big information-sharing system for a military customer.

    FORBES: Magazine Article

  • With Microsoft (nasdaq: MSFT - news - people ), for example, Cisco built a big information-sharing system for a military customer.

    FORBES: Network Stocks: A View From Washington

  • One component of this project is development of a Hydro-meteorological data sharing information system called PIFMIS. Main theme of PIFMIS aka knowledge platform is Hydro-meteorological data entry, analysis, and display of flood related information in a user-friendly way.

    UNESCO: NATURAL SCIENCES

  • It is becoming clear that rather than acting to prevent abusive claims, the asbestos trusts are effectively encouraging fraud by inhibiting claims information sharing between the trusts and the tort system.

    FORBES: GAO Report Details Secrecy Of Asbestos Trusts

  • Now, Cisco plans to shop that system, known as the Secure Information Sharing Architecture, to the private sector.

    FORBES: Network Stocks: A View From Washington

  • These ideas focus on the types of individuals who have committed mass shootings in recent years, and require no massive new infusion of funds into the mental health system, just better information and information-sharing.

    FORBES: Move up http://i.forbesimg.com t Move down

  • The company began developing Sendgine in 2009, growing out of a system allowing lawyers to communicate with clients and one another, sharing information on cases with corresponding documents, Goens explained.

    FORBES: Is Email Broken? Now what? Sendgine Attacks the Problem

  • Rather, it is the coincident sharing of those secrets concurrently with the requested access of information held within a particular system, especially if the secrets are shared by a separate route from the rest of the requests made, which serves to establish the unique validity of the claimant's request.

    ECONOMIST: Fake ID cards

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定