Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Bioterrorism

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Biological Weapons, Biological Warfare, PatriotGrid, Bioweapons
DEFINITION: PatriotGrid is a group of distributed computing projects whose goal is to identify new leads for vaccines or cures for agents known to be potential bioterrorism weapons. To participate in PatriotGrid, users download a free, non-invasive screen saver from grid.org. The screen saver unobtrusively donates the user's extra processing power by recognizing when the user's computer is idle and linking up  … 
Definition continues below.
Bioterrorism Reports
51 - 75 of 140 Matches Previous Page  |  Next Page
Euro crisis: Key questions CEOs and CIOs should ask each other
sponsored by ComputerWeekly.com
ANALYST BRIEF: With a potential economic crisis looming in the Eurozone, Gartner offers a checklist of questions that CIOs and CEOs should ask each other.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

ComputerWeekly.com

European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Extending Planning & Forecasting with Analytics
sponsored by IBM
WHITE PAPER: This white paper examines the current state of analytics in today's accounting systems, and ventures to find ways to enhance and strengthen this foundation. Learn how automation can help support accounting systems.
Posted: 07 May 2013 | Published: 07 May 2013

IBM

Fighting Economic Crime in the Financial Services sector
sponsored by ComputerWeekly.com
IT BRIEFING: PwC examines the impact of Cybercrime on the financial services industry.
Posted: 27 Mar 2012 | Published: 26 Mar 2012

ComputerWeekly.com

Fighting fraud in government
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

ComputerWeekly.com

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

Hacktivists, Hacker or Cybercriminal? Does it really matter?
sponsored by Threat Track Security
WEBCAST: This webcast discusses the differences between the each type of threat actor and examines when it's important to know who's attacking you and when it's not.
Posted: 05 Jun 2015 | Premiered: Jun 5, 2015

Threat Track Security

How the Florida Department of Justice Predicts More Effective Ways to Treat Young Offenders
sponsored by IBM
CASE STUDY: This white paper explains how IBM analytics solutions have enabled the Florida Department of Juvenile Justice to reduce recidivism rates and deter at-risk youth from entering the juvenile justice system by offering targeted services and treatment at the right time.
Posted: 03 Mar 2015 | Published: 29 Aug 2014

IBM

eBook: The Green Data Center 2.0: Energy Efficient Computing in the 21st century
sponsored by Hewlett Packard Company and Intel
EBOOK: Chapter 4 of the eBook, Green Data Center, picks up where the other previous chapters left off in the plan for going green in the data center. This chapter takes a step back and looks at the project from a holistic point of view for creating a green and energy efficient data center.
Posted: 12 May 2009 | Published: 12 May 2009

Hewlett Packard Company and Intel

eBook: The Pillars of Employee Performance Management
sponsored by SumTotal Systems, Inc.
EBOOK: Now more than ever, HR professionals are tasked with optimizing performance management processes across the board, so they can ensure the most efficient use of corporate resources. Performance management will lead a company toward better engaging, retaining, and developing its most valuable asset: the workforce.
Posted: 11 Mar 2009 | Published: 11 Mar 2009

SumTotal Systems, Inc.

EMA Analyst Report: Enabling Real-World Business Transformation through IBM Service Management
sponsored by IBM
INFORMATION CENTER: Visit this information center and find out how smarter technology can result in gains in efficiency, business alignment and risk management strategies.
Posted: 05 Oct 2009 | Published: 01 Oct 2009

IBM

ERP Software Selection Criteria for Midsized Businesses
sponsored by Sage Software
EGUIDE: In this E-Guide, you will gain practical advice and best practices for choosing an ERP system from Jim Shepherd, senior vice president of research for AMR Research.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

First Annual Cost of Cyber Crime Study
sponsored by ArcSight, an HP Company
WHITE PAPER: Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

ArcSight, an HP Company

Five Procurement Guidelines You Can't Afford to Ignore
sponsored by StarCite
WHITE PAPER: Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination.
Posted: 29 Aug 2008 | Published: 29 Aug 2008

StarCite

From Fear to Value: CIO strategies for propelling business through the economic crisis
sponsored by IBM
WHITE PAPER: Your aspiration: As a CIO, drive change, innovation and efficiency to help build a smarter enterprise that will prosper amidst global competition. Your daily challenge: As a CIO, deliver business results faster and better–with less. This whitepaper outlines key strategies for CIOs to drive business results through the economic crisis.
Posted: 18 Jun 2010 | Published: 17 Mar 2009

IBM

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

How SkillSoft Learning Impacts Performance of Individuals and Organizations
sponsored by Skillsoft
WHITE PAPER: In late 2010, Skillsoft asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study to determine the value that SkillSoft training provides to individuals and organizations. Check out this white paper to explore the results of this study and key findings.
Posted: 28 Aug 2012 | Published: 28 Feb 2011

Skillsoft

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

How to Transform Your Business - A Strategic Roadmap for Delivering Value
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn how to integrate your operations into a new structure acquired through mergers and acquisitions; align your IT operations into a single platform; enhance customer service; increase the productivity of your global workforce; and bolster supply chain efficiency.
Posted: 14 May 2012 | Published: 14 May 2012

SAP America, Inc.

How to Use the Six Laws of Persuasion during a Negotiation
sponsored by Global Knowledge
WHITE PAPER: Discover the Six Laws of Persuasion and learn how to use them to conduct more effective negotiations.
Posted: 10 Dec 2008 | Published: 01 Oct 2006

Global Knowledge
51 - 75 of 140 Matches Previous Page    1 2 3 4 5 6    Next Page
 
BIOTERRORISM DEFINITION (continued): … PatriotGrid is a group of distributed computing projects whose goal is to identify new leads for vaccines or cures for agents known to be potential bioterrorism weapons. To participate in PatriotGrid, users download a free, non-invasive screen saver from grid.org. The screen saver unobtrusively donates the user's extra processing power by recognizing when the user's computer is idle and linking up to a world-wide computer grid coordinated by United Devices. The grid of volunteer processing power acts as a supercomputer capable of running 1 trillion computations per second. PatriotGrid is being promoted as a way for ordinary citizens around the world to actively participate against the threat of bioterrorism.
Bioterrorism definition sponsored by SearchSOA.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement