• One avenue of inquiry may be communication between different security agencies in France.

    CNN: France asks: Were warnings missed on Toulouse killer?

  • He's obviously in constant communication with his national security team on matters like this and other matters.

    WHITEHOUSE: Press Briefing

  • Given the challenges we face together in a rapidly changing region, we also agreed to establish a new, formal channel of communication between our national security advisors.

    WHITEHOUSE: President Obama��s Press Conference with Prime Minister Maliki | The White House

  • Spanning multiple computing, communication and entertainment platforms, Logitech's combined hardware and software enable or enhance digital navigation, music and video entertainment, gaming, social networking, audio and video communication over the Internet, video security and home-entertainment control.

    ENGADGET: Logitech G300 mouse delivers gaming friendly features on the cheap

  • He will be in constant communication and get regular briefings from his national security team, as well as his economic team, and he will, of course, be fully capable, if necessary, of traveling back if that were required.

    WHITEHOUSE: Press Briefing

  • The trouble with this approach to the relatively slow interconnection of the processors, latency and lack of real-time security is that there are synchronization and communication challenges, software programming complexities and other issues that are exacerbated in a cloud computing environment.

    FORBES: Moore's Law: Why It Matters Now More Than Ever

  • Argon, founded in 1997, is involved in intelligence, cyber security, and C4ISR, which is essentially communication, but officially stands for command, control, communications, computers, intelligence, surveillance, and reconnaissance.

    FORBES

  • The Anti-Terrorism, Crime and Security Act was passed in December 2001 and also calls on companies providing communication services to retain data to help police investigate serious crimes.

    BBC: Privacy fears over EU snooping plans

  • Finally, the security gurus took a device popular in the US, and used non-encrypted ethernet communication between the terminal and other peripherals to hack into the payment device and take root control.

    ENGADGET: Security experts hack payment terminals to steal credit card info, play games

  • Recommendations call for Diplomatic Security agents to accompany every convoy, Rice the installation of video cameras in security vehicles, audio recordings of radio traffic between the embassy and such convoys and improved coordination and communication between convoys and the U.S. military.

    NPR: U.S. Embassy Security Practices in Iraq Overhauled

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定