Search results
From KYNNpedia
Page title matches
- #REDIRECT [[Information security audit]] ...58 bytes (7 words) - 10:25, 26 February 2020
- ...tions/publication/so_contribution.pdf Contribution of Renewables to Energy Security]</ref> Since renewable energy is more evenly distributed than fossil fuels ==Energy security== ...13 KB (1,771 words) - 11:41, 3 March 2024
Page text matches
- ...se of video sensors is increasing. Two main applications are electronic [[security]] and [[market research]]. [[Category:Film and video technology]] ...1 KB (138 words) - 12:01, 26 August 2023
- ...icrowave oven and a refrigerator |A kitchen with various types of domestic technology, including an oven, a [[microwave oven]] and a [[refrigerator]]]] ...[[applied science]] into the home. There are multiple aspects of domestic technology. On one level, there are [[home appliance]]s, [[home automation]] and other ...7 KB (895 words) - 16:21, 8 January 2024
- [[File:Mobiles.JPG|thumb|Two mobile phones in a [[security bag]] or "evidence bag"]] ...drug test specimen bottle.png|thumb|Drug test specimen bottle: Frangible [[security label]] detects tampering or altering of the specimen.]] ...8 KB (1,017 words) - 15:13, 14 August 2023
- | name = Forum of Incident Response and Security Teams ...UIDANCE FOR IMPROVING THE COMPARABILITY OF STATISTICS PRODUCED BY COMPUTER SECURITY INCIDENT RESPONSE TEAMS|url=https://www.oecd.org/officialdocuments/publicdi ...9 KB (1,233 words) - 15:30, 25 October 2023
- ...ldings which they supply with energy, are a prime example of a soft energy technology.]] ...of scale, and are matched to end-use needs in terms of quality. An energy technology must satisfy all five of these criteria to be soft.<ref name=en/> ...4 KB (575 words) - 04:57, 27 October 2023
- ==Significance for agriculture, food security, climate change mitigation and adaptation and the MDGs== ...agro-ecological farming systems and technology in order to achieve [[food security]], [[climate change mitigation]], [[climate change adaptation]] and the rea ...5 KB (704 words) - 23:54, 21 October 2023
- ...power.htm |title=Preface |work=Brittle Power: Energy Strategy for National Security |date=October 21, 2001 |author=Lovins, Amory B. |url-status=dead |archiveur ...rittlePower_Parts123.pdf|title=Brittle Power: Energy Strategy for National Security|page=Chapter 1, p. 1|author=Lovins, Amory B.|date=October 21, 2001|access-d ...11 KB (1,436 words) - 04:03, 21 July 2023
- ...rity over recent years, with the trend being attributed to advancements in technology, growing digital connectivity, and increasing demand for corporate espionag | website = National Cyber Security Alliance (StaySafeOnline.org) ...6 KB (741 words) - 06:46, 13 February 2024
- ...nd organizing and controlling, along with other aspects that are unique to technology, like [[software design]], network planning, tech support etc.<ref>{{cite b ...technology. To achieve this, [[business strategy|business strategies]] and technology must be aligned. ...11 KB (1,453 words) - 23:47, 28 December 2023
- ...bed "Operation Dara-e-Bolan" on [[Pakistan]]i security forces, capturing [[security checkpoint|checkpoints]] and Pakistani [[military base|bases]] in [[Machh]] '''Science and technology''' ...4 KB (475 words) - 15:27, 12 February 2024
- ...ting charge and any possible flaws affecting the battery's performance and security. ...om/books?id=6dukgCogOTQC&dq=battery+tester&pg=PA348 Power Equipment Engine Technology] By Edward Abdo ...3 KB (420 words) - 02:20, 14 September 2023
- **The [[Russia]]n [[Federal Security Service]] arrests Ksenia Karelina, a [[dual citizenship|dual Russian-Americ '''Science and technology ''' ...2 KB (283 words) - 10:41, 22 February 2024
- ...]] fundamentals to create [[customer advantage]]. Typical concepts used in technology management are: * [[Technology strategy]] (a logic or role of technology in organization), ...6 KB (878 words) - 22:13, 16 April 2023
- ...fications.<ref name=":0">{{Cite book|title=Designing and Evaluating Usable Technology in Industrial Research: Three Case Studies|last=Karat|first=Clare-Marie|las ...2003)</ref> and may change the whole use [[paradigm]]—advances to a mature technology are usually [[wikt:incremental|incremental]] improvements only. ...5 KB (642 words) - 01:47, 18 December 2023
- ....com/books?id=B0e6BQAAQBAJ&pg=PA880 |page=880 |title=Quality, Reliability, Security and Robustness in Heterogeneous Networks |first=Karan |author=Singh |year=2 [[Category:Information technology management]] ...2 KB (276 words) - 02:51, 13 April 2023
- ...gside other competencies. This dynamic strategy ensures that the wheels of technology planning revolve quickly and efficiently, adjusting to the always changing == Strategies for providing an information technology planning capability. == ...6 KB (815 words) - 05:41, 10 January 2024
- == In information security == ...Joint Task |date=2020-12-10 |publisher=National Institute of Standards and Technology |issue=NIST Special Publication (SP) 800-53 Rev. 5 |language=en}}</ref> ...8 KB (1,163 words) - 05:33, 8 March 2024
- ...tions/publication/so_contribution.pdf Contribution of Renewables to Energy Security]</ref> Since renewable energy is more evenly distributed than fossil fuels ==Energy security== ...13 KB (1,771 words) - 11:41, 3 March 2024
- ==Security== The common technology<ref>See ISO/IEC 18014-1:2002 Chapter 4.2</ref> for guaranteeing long-term a ...13 KB (1,730 words) - 03:20, 21 August 2023
- ...-Oxley Act]]. The [[COBIT]] Framework (Control Objectives for Information Technology) is a widely used framework promulgated by the IT Governance Institute, whi ...sical security]] - controls to ensure the physical security of information technology from individuals and from environmental risks. ...17 KB (2,318 words) - 20:13, 6 February 2024