Search results

Jump to navigation Jump to search

Page title matches

  • ...rmation is something that imparts knowledge, that will increase knowledge. Information is difficult to precisely define. There are a number of different definitio ...tp://www.businessdictionary.com/definition/information.html|title="What is information"|publisher=businessdictionary.com}} </ref> defines it as:
    6 KB (955 words) - 04:20, 8 September 2020
  • The article begins by talking about information theory, which is a rather specific area of computer science. If this is to ...ibrary and Information Science, after all. They are ''the'' experts about information, taken as a general topic. --[[User:Larry Sanger|Larry Sanger]] 17:07, 22 M
    3 KB (454 words) - 16:31, 17 May 2011
  • <!-- Text is transcluded from the Asymmetric information/Definition subpage-->
    91 bytes (11 words) - 06:32, 2 February 2010
  • 390 bytes (55 words) - 04:57, 28 March 2012
  • #Redirect [[Information theory]]
    32 bytes (3 words) - 14:41, 10 May 2008
  • In United States and NATO doctrine, '''information operations (IO)''' are "The integrated employment of the core capabilities ==Primary Activities in Information Operations==
    10 KB (1,449 words) - 07:30, 18 March 2024
  • #REDIRECT [[Information management]]
    36 bytes (3 words) - 10:30, 2 February 2012
  • 154 bytes (20 words) - 00:17, 2 October 2009
  • <!-- Text is transcluded from the Information asymmetry/Definition subpage-->
    90 bytes (11 words) - 07:30, 27 March 2012
  • <!-- Text is transcluded from the Information cascade/Definition subpage-->
    88 bytes (11 words) - 05:27, 17 March 2010
  • 12 bytes (1 word) - 20:56, 23 December 2007
  • 12 bytes (1 word) - 12:06, 17 May 2008
  • #REDIRECT [[Talk:Information management]]
    41 bytes (4 words) - 10:30, 2 February 2012
  • | pagename = Information | abc = Information
    847 bytes (82 words) - 08:39, 15 March 2024
  • ...access to a computer, all resources on that computer became available. As information threats grew, user rights were restricted on individual computers; a casual ...hether an individual or a government, is likely to try to access one's own information and communications, and how much effort and expense the miscreant will use.
    13 KB (2,000 words) - 16:21, 30 March 2024
  • But should be moved to [[information management]] (lowercase). See [[CZ:Naming Conventions]]. --[[User:Larry Sa
    356 bytes (45 words) - 11:15, 2 February 2012
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • 81 bytes (10 words) - 17:12, 12 April 2010
  • 12 bytes (1 word) - 18:56, 3 November 2007
  • Looking at this article, I'm wondering if "information security" is an even better title, perhaps reserving "communications securi : I prefer "information security" as a title for a top-level article. "communications security" exc
    4 KB (594 words) - 20:03, 24 October 2008
  • ...opriate administrative infrastructure for personnel and physical security. Information assurance is meaningless without a security policy defining threats, manage Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules,
    2 KB (232 words) - 16:21, 30 March 2024
  • ...liography in 1895.<ref name=Rayward>Rayward, W.B. (1975) ''The universe of information: the work of Paul Otlet for documentation and international organisation''. ...ganizations and made the economic issues more apparent, to the extent that information management is now seen as having a necessary role in the management of orga
    52 KB (7,729 words) - 23:12, 20 October 2013
  • 29 bytes (3 words) - 01:16, 9 September 2013
  • '''Information overload''' is assumed to have increased significantly in organizations as ...e knowledge available to intelligence and military personnel can cause key information to be missed, as with the [[9/11]] attack.
    14 KB (2,131 words) - 08:39, 22 April 2024
  • File:Information icon.svg.png
    (62 × 62 (4 KB)) - 19:53, 11 March 2022
  • ...lease. The general assumption is that the inappropriate disclosure of such information could do varying levels of harm to the national security of a nation, inclu ...internally as is classified material; governments may receive proprietary information and will be expected, within legal requirements, to protect it from disclos
    12 KB (1,757 words) - 07:30, 18 March 2024
  • ...tten so far, am I correct in that you are focusing on relatively long-term information results in classical expertise, or are things that are more tactical or rea ...ontent/341/bmj.c6815.full this article], "Alvin Toffler coined the phrase “information overload” in 1970" in "Toffler A. Future shock. Bodley Head, 1970", which
    2 KB (328 words) - 19:31, 1 February 2011
  • ...=de Bliek R, Friedman CP, Wildemuth BM, Martz JM, Twarog RG, File D |title=Information retrieved from a database and the augmentation of personal knowledge |journ | title = Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips
    42 KB (5,875 words) - 11:11, 29 March 2012
  • 12 bytes (1 word) - 16:29, 22 August 2008
  • ...attempt to understand and define the basis for understanding the nature of information and its place in the universe, two different key approaches were taken; the ...ematical foundation consisted of a number that could be calculated for the information content of a sequence of symbols in a language given the frequencies of the
    2 KB (363 words) - 14:37, 10 May 2008
  • 12 bytes (1 word) - 11:41, 22 May 2008
  • <!-- Text is transcluded from the Information assymetry/Definition subpage-->
    90 bytes (11 words) - 16:24, 26 March 2012
  • 12 bytes (1 word) - 05:13, 18 December 2007
  • #Redirect [[Classified information]]
    36 bytes (3 words) - 11:53, 22 May 2008
  • 12 bytes (1 word) - 15:02, 10 November 2007
  • In information science, a '''geographic information system''' (GIS) is typically defined as a computer [[software]] in Geographic Information Science''. Clarke, K. C. (''ed.''). Prentice Hall, Upper Saddle
    8 KB (1,161 words) - 20:13, 21 October 2010
  • | pagename = Information theory | abc = Information theory
    1,004 bytes (109 words) - 08:38, 15 March 2024
  • 42 bytes (4 words) - 09:29, 27 May 2008
  • ...resources, personnel, procedures and technologies that provide end-to-end information sharing among all elements of the U.S. Department of Defense, other U.S. go ...the "edge" of the GIG. These tactical networks, such as the Joint Tactical Information Distribution System, or ''ad hoc'' networks set up with radios in individua
    8 KB (1,196 words) - 16:22, 30 March 2024
  • | pagename = Information overload | abc = Information overload
    2 KB (291 words) - 00:23, 20 February 2010
  • {{Duplicate|Geographic information system}}
    241 bytes (34 words) - 20:11, 2 June 2008
  • 12 bytes (1 word) - 10:32, 2 February 2012
  • 12 bytes (1 word) - 02:44, 24 January 2009
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:29, 27 March 2012
  • 12 bytes (1 word) - 05:16, 18 December 2007
  • 42 bytes (4 words) - 13:11, 27 May 2008
  • 81 bytes (10 words) - 15:29, 2 March 2010
  • {{Duplicate|Geographic Information System}} ...d we get rid of that one. The article should reside here, at [[Geographic information system]], since it isn't a proper noun. --[[User:Todd Coles|Todd Coles]] 09
    885 bytes (138 words) - 20:11, 2 June 2008
  • | pagename = Information retrieval | abc = Information retrieval
    1 KB (114 words) - 08:38, 15 March 2024
  • | pagename = Information operations | abc = Information operations
    970 bytes (97 words) - 11:23, 11 February 2024
  • 12 bytes (1 word) - 12:50, 29 August 2008
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • A succession of incremental information distortions occurring as a result of [[herding (banking)|herding]] behaviou
    153 bytes (18 words) - 05:28, 17 March 2010
  • | pagename = Information security | abc = Information security
    2 KB (233 words) - 20:04, 24 October 2008
  • #REDIRECT [[Information asymetry/Definition]]
    45 bytes (4 words) - 07:44, 27 March 2012
  • 209 bytes (23 words) - 20:08, 7 June 2008
  • 12 bytes (1 word) - 11:34, 6 May 2010
  • | pagename = Information Management | abc = Information Management
    902 bytes (88 words) - 10:27, 25 July 2008
  • An alternative term for [[information overload]].
    85 bytes (9 words) - 17:09, 12 April 2010
  • | pagename = Information management | abc = Information management
    846 bytes (68 words) - 10:07, 5 January 2014
  • 12 bytes (1 word) - 20:57, 23 December 2007
  • A '''Forwarding Information Base''' (FIB), also known as a '''forwarding table''', is most commonly use In contrast to Routing Information Base | Routing Information Bases (RIB), also known as routing tables, FIBs are optimized for fast look
    12 KB (1,828 words) - 16:22, 30 March 2024
  • 54 bytes (4 words) - 11:57, 2 August 2013
  • ...ility of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to trans
    273 bytes (34 words) - 08:55, 4 September 2009
  • ...r bureaucratic reasons, its foreign offices were designated as the '''U.S. Information Service (USIS)'''; these often included public libraries.
    1 KB (217 words) - 23:06, 21 January 2010
  • ...ciples to the acquisition, organization, control, dissemination and use of information relevant to the effective operation of organizations of all kinds.
    224 bytes (28 words) - 10:31, 2 February 2012
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • #REDIRECT [[Information management/Definition]]
    47 bytes (4 words) - 10:31, 2 February 2012
  • 81 bytes (10 words) - 17:30, 26 April 2010
  • a situation in which a seller has information that is not available to potential buyers - or vice-versa.
    140 bytes (21 words) - 08:34, 30 October 2009
  • 12 bytes (1 word) - 01:08, 10 May 2008
  • | pagename = Information assurance | abc = Information assurance
    2 KB (233 words) - 10:29, 27 February 2010
  • ...y intelligence analysis management|analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be ...iscipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
    10 KB (1,349 words) - 17:08, 1 April 2024
  • Technique and process of searching, retrieving, and interpreting information from large amounts of stored data.
    148 bytes (18 words) - 19:27, 7 September 2009
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • ...searches), analyze the spatial information, and edit data. '''[[Geographic Information Science]]''' is the science underlying the applications and systems, taught Geographic information systems technology can be used for [[science|scientific investigation]]s, [
    41 KB (6,343 words) - 17:02, 22 March 2024
  • #REDIRECT [[Information management/Bibliography]]
    49 bytes (4 words) - 10:32, 2 February 2012
  • ...cs associated with those routes) to particular network destinations. This information contains the topology of the network immediately around it. The construct ...ore this implementation detail, and refer to the entire routing/forwarding information subsystem as the "routing table".
    6 KB (958 words) - 16:23, 30 March 2024
  • | pagename = Classified information | abc = Classified information;
    2 KB (230 words) - 10:37, 27 February 2010
  • ...chnologies and procedures used to confirm one's identification to a secure information system. You can think of it as a safeguard against [[identity theft]].
    2 KB (292 words) - 14:55, 20 May 2010
  • 12 bytes (1 word) - 23:02, 21 January 2010
  • 202 bytes (30 words) - 12:09, 22 January 2009
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • File:Biological information flow.gif
    (953 × 351 (11 KB)) - 19:54, 11 March 2022
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:44, 27 March 2012
  • ...ministrative controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • 12 bytes (1 word) - 13:01, 17 July 2008
  • A perception by a person (or observer) that the information associated with work tasks is greater than can be managed effectively, and
    278 bytes (42 words) - 05:55, 25 July 2008
  • '''Warfighter Information Network-Tactical (WIN-T)''' is the evolving [[United States Army]] tactica | title = General Dynamics Tests Largest-Ever Army Information Network
    11 KB (1,530 words) - 10:20, 8 April 2024
  • 12 bytes (1 word) - 01:13, 10 May 2008
  • 31 bytes (4 words) - 05:36, 15 March 2024
  • ...and information security, such that it meets the criteria for [[classified information]] subject to [[compartmented control system]]s.<ref name=DCID>{{citation |title =Physical Security Standards for Sensitive Compartmented Information Facilities
    4 KB (639 words) - 05:49, 8 April 2024
  • ...g/ Information Resources Management Association] - the USA association for information managers. * [http://www.aslib.co.uk/ Aslib] - the UK association for information management.
    2 KB (222 words) - 10:31, 2 February 2012
  • | pagename = Warfighter Information Network–Tactical | abc = Warfighter Information Network–Tactical
    1 KB (109 words) - 12:50, 10 February 2011
  • 176 bytes (22 words) - 06:49, 17 March 2024
  • ...ture for a variety of [[routing|routed]] military networks, the '''Defense Information Systems Network (DISN)''' was also an incremental replacement of transmissi ...the [[transportable]] and [[mobile]] transmission systems in [[Warfighter Information Network-Tactical]], it interconnects fixed locations that connect to WIN-T
    1 KB (151 words) - 10:20, 8 April 2024
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • | pagename = Geographic information system | abc = Geographic information system
    1,014 bytes (111 words) - 23:44, 16 February 2008
  • 237 bytes (33 words) - 10:32, 11 August 2009
  • | pagename = Global Information Grid | abc = Global Information Grid
    1 KB (107 words) - 12:51, 10 February 2011

Page text matches

  • == Demographic Information == == Specialty Information ==
    286 bytes (29 words) - 04:08, 22 November 2023
  • ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privile
    299 bytes (36 words) - 11:15, 6 May 2010
  • ...panda/37640.htm Giant Panda] - China Internet Information Center - images, information and links from China, in English *[http://www.pandaclub.net Panda Club] - information from the [[Wolong National Nature Reserve]] in [[Sichuan]]
    287 bytes (42 words) - 03:00, 30 October 2007
  • ...g/ Information Resources Management Association] - the USA association for information managers. * [http://www.aslib.co.uk/ Aslib] - the UK association for information management.
    2 KB (222 words) - 10:31, 2 February 2012
  • In ''[[information science]]'', the organizational structure of information.
    76 bytes (10 words) - 09:23, 17 April 2011
  • ...(information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • ...ry, government documents, especially [[classified information|declassified information]]
    197 bytes (20 words) - 18:40, 18 November 2009
  • ...tion in a [[compartmented control system]] such as Sensitive Compartmented Information (SCI) or Special Access Program (SAP)
    306 bytes (38 words) - 11:45, 16 July 2008
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • ==Finding information==
    204 bytes (29 words) - 13:12, 24 November 2009
  • == Personal information ==
    209 bytes (27 words) - 04:52, 22 November 2023
  • ...site]. Can anyone figure out what the license should be based on this new information? The attribution needs to be changed too. [[User:Chris Day|Chris Day]] 10:
    355 bytes (58 words) - 10:50, 16 September 2008
  • * [http://www.worldcoal.org/coal_info.asp Coal Information] From website of the World Coal Institute. ...ww.uky.edu/KGS/coal/coal_mining.htm Methods of Mining] Excellent source of information on coal mining methods.
    851 bytes (113 words) - 10:55, 22 October 2010
  • ...magnetic signal transmission, the basic information-free signal onto which information is modulated.
    146 bytes (16 words) - 17:05, 26 May 2008
  • ====Places with more information====
    542 bytes (70 words) - 13:37, 28 May 2009
  • In [[information security]], the assurance that data retrieved from an information system has the same meaning as when it was entered
    169 bytes (24 words) - 15:24, 30 September 2009
  • .../wiki/Template:UKHouseofCommonsStateoftheParties-tablerows to change party information.-->
    448 bytes (47 words) - 07:49, 26 March 2017
  • .../wiki/Template:UKHouseofCommonsStateoftheParties-tablerows to change party information.-->
    457 bytes (46 words) - 08:25, 1 April 2022
  • ...or subsequent analysis, and assigning probabilities of accuracy to the raw information
    312 bytes (39 words) - 10:14, 26 July 2008
  • == Online information about school history == This information came out in early 2022 and could be incorporated into this article: https:/
    434 bytes (51 words) - 06:31, 5 June 2022
  • ...ibe the format of managed information, that being the role of [[Management Information Base]] specifications
    341 bytes (48 words) - 10:29, 25 September 2008
  • ...[http://www.itl.nist.gov/iaui/894.02/related_projects/muc/ Introduction to Information Extraction]
    269 bytes (32 words) - 08:12, 14 September 2013
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...ain strategic understanding, to detect anomalies, or to actively probe for information
    196 bytes (24 words) - 12:30, 22 June 2009
  • ...y]] over [[electromagnetic radiation]] in free space (i.e., wireless). The information is [[modulation|modulated]] onto a [[carrier wave]]
    261 bytes (33 words) - 12:24, 25 May 2008
  • '''[[/Template1|User general information template]]''' '''[[/Template2|User workgroup information template]]'''
    192 bytes (24 words) - 21:46, 19 January 2008
  • ...ogrammers and end users to enter information into computers and to look up information which is already in them.
    174 bytes (26 words) - 08:51, 19 November 2011
  • ...r]], illustrating both sides of the debate whether [[science]] experiences information overload in the era of the [[World Wide Web]] *[http://web2expo.blip.tv/file/1277460 It's Not Information Overload. It's Filter Failure.] &mdash; presentation by [[Clay Shirky]] at
    782 bytes (105 words) - 19:33, 9 December 2010
  • ...on and dissemination of literature or information - the activity of making information available for public view.
    172 bytes (23 words) - 18:48, 11 August 2009
  • ...ly for transient information but sometimes for permanent or semi-permanent information such as "boot" data for initialization
    226 bytes (28 words) - 16:18, 18 March 2009
  • ==General information== ===Production information===
    1 KB (161 words) - 03:37, 4 April 2017
  • {{r|Information theory}} ===Information theory===
    761 bytes (97 words) - 18:05, 3 March 2010
  • ==Further information==
    432 bytes (63 words) - 15:24, 15 December 2013
  • ...pected of war crimes were not prosecuted in exchange for information, such information on the [[Soviet Union]]
    235 bytes (33 words) - 14:18, 14 September 2009
  • ...g aware of all relevant information in one's environment, prioritizing the information, and not being distracted by irrelevancies
    181 bytes (24 words) - 04:31, 2 February 2011
  • Professor of Information Studies UCLA Department of Information Studies
    357 bytes (43 words) - 04:07, 22 November 2023
  • ...ica.org/public/breeds/oc/intro.php The International Cat Association breed information.] *[http://www.iams.com/pet-health/cat-breeds/ocicat IAMS Ocicat breed information]
    395 bytes (55 words) - 23:48, 7 December 2011
  • ...pueblo.gsa.gov] (the [[Federal citizen information center|Federal Citizen Information Center]])
    531 bytes (73 words) - 00:37, 14 September 2013
  • ==Official government information about amateur radio licensing and operating== ...rvices/index.htm?job=service_home&id=amateur FCC] Official U.S. government information about amateur radio, from the Federal Communications Commission, the offici
    1 KB (158 words) - 12:49, 11 October 2009
  • ...gy/BVHomePage.html The Big Picture Book of Viruses] - Pictures and general information on many viruses * [http://www.vbrc.org Detailed genomic and bioinformatic information about Category A, B, and C priority pathogens at NIH-funded database].
    823 bytes (115 words) - 02:48, 27 May 2008
  • ===For additional information===
    671 bytes (93 words) - 19:34, 27 June 2008
  • ...l Library of Information Science and Technology, an open access archive of Information Sciences materials ...vest.sir.arizona.edu DL-Harvest] DL-Harvest, an open access aggregator for Information Sciences
    1 KB (210 words) - 07:20, 12 February 2009
  • ...ated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC.
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...isclosure, including means for protecting personal privacy and proprietary information." <ref>44 USC 3542</ref> ...ure of contents. In a military context, however, the very existence of the information, and of its transmission, must remain secret against the threats of [[traff
    725 bytes (96 words) - 13:27, 30 September 2009
  • ...ty. His interests include Information Research, Information Management and Information Literacy. As the chairman of the Board of Examiners of the faculty of ICT & [[Category:CZ Authors]][[Category:Library and Information Science Authors]]
    685 bytes (96 words) - 04:08, 22 November 2023
  • {{r|Information security}} {{r|RADIUS (information security)}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...ed States public information source, conducting what today is called the [[information operations#psychological operations|"white propaganda" aspect of psychologi
    273 bytes (33 words) - 16:21, 9 September 2008
  • ...ently seeking information on the birth and death of Suchman and additional information. [[User:Roger A. Lohmann|Roger A. Lohmann]] 14:31, 25 April 2013 (UTC)
    180 bytes (25 words) - 09:31, 25 April 2013
  • I finished the medium tourist school, so I know many tourist information about my town Sezana , my region Primorska and about my country Slovenia. ...world can read information about the place, where I live.. I also add some information in Wikipedia.
    593 bytes (98 words) - 04:40, 22 November 2023
  • ...Systems Auditor. I am interested in studies related to India, Outsourcing, Information Technology Auditing and ITIL related methodologies etc;
    362 bytes (56 words) - 04:26, 22 November 2023
  • Information on the International Mathematical Olympiad: Information on the mathematical Olympiad process in India:
    702 bytes (74 words) - 11:27, 25 April 2008
  • * [[Entropy (information theory)|Entropy]] In information theory
    110 bytes (11 words) - 06:57, 24 September 2013
  • ...ency''', is the basic information-free [[electromagnetic wave]] onto which information is [[modulation|modulated]].
    229 bytes (26 words) - 08:40, 11 December 2009
  • ...tion has been verified by {{{1}}} on {{{2}}}.{{#if:{{{3|}}}| The copyright information can be found [{{{3}}} here]}}''[[Category:Copyright Verified Media]]</inclu
    246 bytes (27 words) - 03:25, 29 August 2009
  • ...carries the bulk of [[classified information]], limited to a [[classified information#General classification|security classification]] of SECRET.
    245 bytes (29 words) - 10:56, 15 July 2008
  • ...s (physical and psychosocial) through [[Consumer health information|health information]], preventive programs, and access to [[medical care]].([[National Library
    282 bytes (32 words) - 07:58, 20 June 2011
  • ...business is often defined as the department that does various things with information.<ref>[http://www.thefreedictionary.com/administration Free Dictionary]</ref The four aformentioned categories of information-related tasks are:
    1 KB (181 words) - 04:01, 8 November 2011
  • ...tl/index.html Periodic Table Live!] Allows one to explore a broad range of information about the elements, their reactions, their properties, their structures and ...s and structure; nuclear properties; reactivity indexes; health and safety information.
    987 bytes (131 words) - 16:44, 8 May 2010
  • ==Information sites==
    477 bytes (70 words) - 14:44, 8 October 2009
  • ...nounced by governments to influence target audience, in a broad context of information operations. ...propaganda|white]], [[Information operations#Gray propaganda|gray]] and [[Information operations#Black propaganda| black]]. White is acknowledged by the governme
    867 bytes (123 words) - 14:13, 6 April 2024
  • ...covering a wide range of [[information operations|activities]] to present information favorable to the [[State of Israel]]
    253 bytes (33 words) - 17:06, 20 October 2009
  • ...false sense of security, because in reality the product does not make the information any more secure
    237 bytes (35 words) - 14:55, 25 October 2008
  • * Non-U.S. clinical and regulatory information * How to integrate 'Clinical information' with the section 'Therapeutic considerations'
    3 KB (358 words) - 03:43, 22 November 2023
  • .... Herman Hollerith is credited with the invention of the media for storing information from the United States Census of 1890.
    206 bytes (30 words) - 02:44, 18 March 2009
  • {{Workgroup|group=Library and Information Science}} The subpages listed below represent all the optional library and information science subpages that have been created at Citizendium.
    13 members (0 subcategories, 0 files) - 10:57, 2 September 2009
  • {{r|Information security}} {{r|Identification (information security)}}
    368 bytes (39 words) - 05:38, 15 March 2024
  • ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity."<ref>44 USC 3542</ref> '''Nonrepudiation''' is an aspect of the processing of information. Sender nonrepudiation means that one cannot deny creating a transaction, a
    844 bytes (119 words) - 15:23, 30 September 2009
  • Carl Michael Aguirre has been working with Information Technology for ten years with a background primarily in database architectu ...for Walden University in Applied Management and Decision Sciences with an Information Systems Management Specialization<br/>
    597 bytes (84 words) - 03:30, 22 November 2023
  • ...styles. Used DVD and album table information from WP. Needs picture. Fresh information. --[[User:Thomas Wright Sulcer|Thomas Wright Sulcer]] 00:49, 7 March 2010 (
    242 bytes (33 words) - 19:49, 6 March 2010
  • ...te]]s in their [[routing information base]]; they obtain all their routing information from local configuration and [[routing protocol]]s, especially the Border G
    283 bytes (38 words) - 15:00, 20 March 2024
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • ...y studying a Ph.D. in Organization and Management with a specialization in Information Technology Management Expected on 2009. ...in Science of Business Administration with a major in Finance and Computer Information Systems in 1990.
    824 bytes (113 words) - 04:49, 22 November 2023
  • *[http://www.leukemia-lymphoma.org/all_page?item_id=7049 Information about ALL] from the [[Leukemia & Lymphoma Society]] *[http://www.cancerhelp.org.uk/help/default.asp?page=32107 Information about ALL] from [[Cancer Research UK]]
    1 KB (206 words) - 22:24, 24 September 2009
  • {{Workgroup|group=Library and Information Science}} A category that is placed on all library and information science workgroup pages to allow a list of ''recent edits'' to be created u
    671 members (36 subcategories, 0 files) - 08:04, 19 August 2009
  • | pagename = Information management | abc = Information management
    846 bytes (68 words) - 10:07, 5 January 2014
  • ...engineering techniques for combining multiple [[bandwidth|low bandwidth]] information channels into a high-bandwidth channel more suitable for actual electronic ...ity of the transmission channel, but it can be safely assumed that all the information channels will not be active at the same time. [[Packet switching]] and [[ro
    2 KB (253 words) - 13:33, 26 February 2010
  • {{Approved cat|group=Library and Information Science}} ...articles in the [[CZ:Library and Information Science Workgroup|Library and Information Science Workgroup]], i.e. those that are comprehensive or stable versions o
    0 members (0 subcategories, 0 files) - 09:03, 22 August 2013
  • ...tical]] and by a number of countries; it provides up to 34 Mbps of digital information transfer compatible with the [[Joint Tactical Radio System]] architecture
    330 bytes (44 words) - 20:11, 24 January 2009
  • ...at with use of correct information all net users can get access to correct information. For eg if one is suffering from dengue(DHF) it should be communicated that
    735 bytes (117 words) - 04:46, 22 November 2023
  • ...acific Amphetamine - Type Stimulant Information Centre] - a very extensive information source managed by the United Nations Office on Drugs and Crime *[http://www.quihn.org.au/illicit_drug_use_information.htm Information and harm reduction strategies for amphetamines and other illicit drugs]
    870 bytes (110 words) - 12:52, 1 January 2008
  • ===Generally reliable information from experts=== * [http://www.skatfox.com/ Skatfox]. Information on folklore surrounding the game.
    1 KB (143 words) - 01:55, 17 December 2009
  • ...to 1996 he was Executive Director of Eusidic, the European Association of Information Services. ...Paris based ICSTI, the International Council for Scientific and Technical Information. He relinquished the post in 2005. He carries out consultancy work as a Sen
    1 KB (157 words) - 03:23, 22 November 2023
  • ...cos. He currently teaches undergraduate courses in Information Systems and Information Security and Assurance. ...rmation Security Lab Manual", and "Readings and Cases in the Management of Information Security" with Dr. Michael Whitman. Their latest title, "Incident Response
    1 KB (194 words) - 03:56, 22 November 2023
  • ...ating to various emerging software technologies. My primary interests are Information security and networking. ...Category:Health Sciences Authors|Baek, Young Sang]] [[Category:Library and Information Science Authors|Baek, Young Sang]]
    628 bytes (84 words) - 04:53, 22 November 2023
  • | pagename = Information Management | abc = Information Management
    902 bytes (88 words) - 10:27, 25 July 2008
  • This is an information only article. What is it doing here? [[User:Ori Redler|Ori Redler]] 08:26, ...that we should retain only articles that have something ''in addition to'' information?) --[[User:Larry Sanger|Larry Sanger]] 10:27, 17 March 2007 (CDT)
    601 bytes (92 words) - 10:45, 26 September 2007
  • **AC-20, [[external information systems]] *[[Information system maintenance|Maintenance]]
    2 KB (178 words) - 11:59, 20 September 2009
  • {{r|Information}} *[[List of library and information science programs]]
    528 bytes (63 words) - 12:57, 13 November 2014
  • == JSTOR Company Information == ...57105_200512_990.pdf 990] for the year 2005. There is some useful company information there that can be posted. I'll be back later to sort through the 990 if no
    804 bytes (119 words) - 00:34, 13 March 2008
  • ...y explicit routes in its [[routing information base]]; it gets all routing information from local configuration and dynamic [[routing protocol]]s. Its tables cont ...ll run the Border Gateway Protocol as its major means of acquiring routing information.
    535 bytes (82 words) - 15:00, 20 March 2024
  • ...of a major Scottish university, as well as copyediting for a peer-reviewed information literacy journal. Previous study subjects have included environmental polic ...formation Science Authors|Lawler, Sharon]] [[Category:Inactive Library and Information Science Editors|Lawler, Sharon]]
    890 bytes (112 words) - 04:42, 22 November 2023
  • ...re de la Bretagne et des Bretons, with some other sources. The historical information will only go up to 1532, when Brittany was unified with France. You can se
    949 bytes (144 words) - 04:48, 26 June 2014
  • ====Places with more information====
    1,010 bytes (132 words) - 11:40, 28 May 2009
  • ...n responding to a request, carefully review it and, if needed, confirm the information contain therein. Your actions will be privately logged. You are also expect ...see [[CZ:Account Approval Procedure|Account Approval Procedure]]. Further information (for applicants) is at [[CZ:User pages|User pages]].
    843 bytes (128 words) - 13:51, 20 July 2014
  • ...ss Directory (oad.simmons.edu). I am a contributing editor (columnist) for Information Today. My PhD. and my Master's degrees are from Syracuse University, my und [[Category:Library and Information Science Authors|Peek, Robin Patricia]]
    714 bytes (103 words) - 04:38, 22 November 2023
  • ...such as the use of biological molecules to encode, manipulate and retrieve information, allowing the development of organic memory circuits.
    363 bytes (47 words) - 02:40, 24 June 2008
  • ...ted to Wikipedia, with some additions and considerable rearrangement. Any information in Wikipedia not in the sources I have used has been eliminated. --[[User:
    327 bytes (47 words) - 14:07, 8 July 2015
  • ..., who may participate, locations, and phone numbers for more details. This information should be used in conjunction with advice from health care professionals.
    419 bytes (59 words) - 11:44, 26 June 2011
  • ===Contact Information:=== [[Category:Inactive Library and Information Science Editors|Drew, Bill]]
    1,015 bytes (128 words) - 03:24, 22 November 2023
  • ====Places with more information====
    1 KB (154 words) - 11:32, 28 May 2009
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)