Search results

Jump to navigation Jump to search

Page title matches

  • ...rmation is something that imparts knowledge, that will increase knowledge. Information is difficult to precisely define. There are a number of different definitio ...tp://www.businessdictionary.com/definition/information.html|title="What is information"|publisher=businessdictionary.com}} </ref> defines it as:
    6 KB (955 words) - 04:20, 8 September 2020
  • #REDIRECT [[Information management]]
    36 bytes (3 words) - 10:30, 2 February 2012
  • 81 bytes (10 words) - 17:12, 12 April 2010
  • 12 bytes (1 word) - 18:56, 3 November 2007
  • #Redirect [[Information theory]]
    32 bytes (3 words) - 14:41, 10 May 2008
  • ...liography in 1895.<ref name=Rayward>Rayward, W.B. (1975) ''The universe of information: the work of Paul Otlet for documentation and international organisation''. ...ganizations and made the economic issues more apparent, to the extent that information management is now seen as having a necessary role in the management of orga
    52 KB (7,729 words) - 23:12, 20 October 2013
  • ...access to a computer, all resources on that computer became available. As information threats grew, user rights were restricted on individual computers; a casual ...hether an individual or a government, is likely to try to access one's own information and communications, and how much effort and expense the miscreant will use.
    13 KB (2,000 words) - 16:21, 30 March 2024
  • In United States and NATO doctrine, '''information operations (IO)''' are "The integrated employment of the core capabilities ==Primary Activities in Information Operations==
    10 KB (1,449 words) - 07:30, 18 March 2024
  • ...=de Bliek R, Friedman CP, Wildemuth BM, Martz JM, Twarog RG, File D |title=Information retrieved from a database and the augmentation of personal knowledge |journ | title = Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips
    42 KB (5,875 words) - 11:11, 29 March 2012
  • ...opriate administrative infrastructure for personnel and physical security. Information assurance is meaningless without a security policy defining threats, manage Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules,
    2 KB (232 words) - 16:21, 30 March 2024
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • ...attempt to understand and define the basis for understanding the nature of information and its place in the universe, two different key approaches were taken; the ...ematical foundation consisted of a number that could be calculated for the information content of a sequence of symbols in a language given the frequencies of the
    2 KB (363 words) - 14:37, 10 May 2008
  • ...lease. The general assumption is that the inappropriate disclosure of such information could do varying levels of harm to the national security of a nation, inclu ...internally as is classified material; governments may receive proprietary information and will be expected, within legal requirements, to protect it from disclos
    12 KB (1,757 words) - 07:30, 18 March 2024
  • <!-- Text is transcluded from the Information assymetry/Definition subpage-->
    90 bytes (11 words) - 16:24, 26 March 2012
  • #Redirect [[Classified information]]
    36 bytes (3 words) - 11:53, 22 May 2008
  • '''Information overload''' is assumed to have increased significantly in organizations as ...e knowledge available to intelligence and military personnel can cause key information to be missed, as with the [[9/11]] attack.
    14 KB (2,131 words) - 08:39, 22 April 2024
  • 154 bytes (20 words) - 00:17, 2 October 2009
  • <!-- Text is transcluded from the Asymmetric information/Definition subpage-->
    91 bytes (11 words) - 06:32, 2 February 2010
  • <!-- Text is transcluded from the Information asymmetry/Definition subpage-->
    90 bytes (11 words) - 07:30, 27 March 2012
  • <!-- Text is transcluded from the Information cascade/Definition subpage-->
    88 bytes (11 words) - 05:27, 17 March 2010
  • A '''Forwarding Information Base''' (FIB), also known as a '''forwarding table''', is most commonly use In contrast to Routing Information Base | Routing Information Bases (RIB), also known as routing tables, FIBs are optimized for fast look
    12 KB (1,828 words) - 16:22, 30 March 2024
  • An alternative term for [[information overload]].
    85 bytes (9 words) - 17:09, 12 April 2010
  • 12 bytes (1 word) - 10:32, 2 February 2012
  • ...cs associated with those routes) to particular network destinations. This information contains the topology of the network immediately around it. The construct ...ore this implementation detail, and refer to the entire routing/forwarding information subsystem as the "routing table".
    6 KB (958 words) - 16:23, 30 March 2024
  • ...chnologies and procedures used to confirm one's identification to a secure information system. You can think of it as a safeguard against [[identity theft]].
    2 KB (292 words) - 14:55, 20 May 2010
  • #REDIRECT [[Information management/Definition]]
    47 bytes (4 words) - 10:31, 2 February 2012
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • A succession of incremental information distortions occurring as a result of [[herding (banking)|herding]] behaviou
    153 bytes (18 words) - 05:28, 17 March 2010
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...y intelligence analysis management|analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be ...iscipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
    10 KB (1,349 words) - 17:08, 1 April 2024
  • 31 bytes (4 words) - 05:36, 15 March 2024
  • #REDIRECT [[Information management/Bibliography]]
    49 bytes (4 words) - 10:32, 2 February 2012
  • ...ministrative controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • ...r bureaucratic reasons, its foreign offices were designated as the '''U.S. Information Service (USIS)'''; these often included public libraries.
    1 KB (217 words) - 23:06, 21 January 2010
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:44, 27 March 2012
  • ...ility of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to trans
    273 bytes (34 words) - 08:55, 4 September 2009
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • 12 bytes (1 word) - 05:16, 18 December 2007
  • Technique and process of searching, retrieving, and interpreting information from large amounts of stored data.
    148 bytes (18 words) - 19:27, 7 September 2009
  • ...ciples to the acquisition, organization, control, dissemination and use of information relevant to the effective operation of organizations of all kinds.
    224 bytes (28 words) - 10:31, 2 February 2012
  • 12 bytes (1 word) - 20:57, 23 December 2007
  • ...resources, personnel, procedures and technologies that provide end-to-end information sharing among all elements of the U.S. Department of Defense, other U.S. go ...the "edge" of the GIG. These tactical networks, such as the Joint Tactical Information Distribution System, or ''ad hoc'' networks set up with radios in individua
    8 KB (1,196 words) - 16:22, 30 March 2024
  • The situation in which relevant information is known to some parties to an agreement, but not to others.
    140 bytes (21 words) - 07:29, 27 March 2012
  • 42 bytes (4 words) - 09:29, 27 May 2008
  • 202 bytes (30 words) - 12:09, 22 January 2009
  • ...searches), analyze the spatial information, and edit data. '''[[Geographic Information Science]]''' is the science underlying the applications and systems, taught Geographic information systems technology can be used for [[science|scientific investigation]]s, [
    41 KB (6,343 words) - 17:02, 22 March 2024
  • a situation in which a seller has information that is not available to potential buyers - or vice-versa.
    140 bytes (21 words) - 08:34, 30 October 2009
  • In information science, a '''geographic information system''' (GIS) is typically defined as a computer [[software]] in Geographic Information Science''. Clarke, K. C. (''ed.''). Prentice Hall, Upper Saddle
    8 KB (1,161 words) - 20:13, 21 October 2010
  • 42 bytes (4 words) - 13:11, 27 May 2008
  • '''Warfighter Information Network-Tactical (WIN-T)''' is the evolving [[United States Army]] tactica | title = General Dynamics Tests Largest-Ever Army Information Network
    11 KB (1,530 words) - 10:20, 8 April 2024
  • 81 bytes (10 words) - 15:29, 2 March 2010
  • #REDIRECT [[Information asymetry/Definition]]
    45 bytes (4 words) - 07:44, 27 March 2012
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • A perception by a person (or observer) that the information associated with work tasks is greater than can be managed effectively, and
    278 bytes (42 words) - 05:55, 25 July 2008
  • 54 bytes (4 words) - 11:57, 2 August 2013
  • 209 bytes (23 words) - 20:08, 7 June 2008
  • 81 bytes (10 words) - 17:30, 26 April 2010
  • ...g/ Information Resources Management Association] - the USA association for information managers. * [http://www.aslib.co.uk/ Aslib] - the UK association for information management.
    2 KB (222 words) - 10:31, 2 February 2012
  • 237 bytes (33 words) - 10:32, 11 August 2009
  • *Bolstad, P. (2005) ''GIS Fundamentals: A first text on Geographic Information Systems, Second Edition''. White Bear Lake, MN: Eider Press, 543 pp. *Burrough, P.A. and McDonnell, R.A. (1998) ''Principles of geographical information systems''. Oxford University Press, Oxford, 327 pp. [http://www.oup.co.uk/b
    1 KB (199 words) - 17:57, 3 November 2013
  • ...(information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • 12 bytes (1 word) - 14:05, 26 September 2007
  • ...ng to overt foreign broadcasts, translating them, and bringing significant information to the attention of operations and policy personnel. The listeners and tran ...rnments, it has been the first U.S. intelligence organization to learn the information.
    1 KB (181 words) - 16:15, 6 November 2009
  • #REDIRECT [[Information management/External Links]]
    51 bytes (5 words) - 10:31, 2 February 2012
  • 102 bytes (12 words) - 03:46, 18 August 2009
  • 138 bytes (21 words) - 22:04, 19 June 2008
  • #REDIRECT [[U.S. Information Agency]]
    37 bytes (5 words) - 23:10, 21 January 2010
  • {{:Information overload/Related Articles}}
    42 bytes (4 words) - 17:09, 12 April 2010
  • ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privile
    299 bytes (36 words) - 11:15, 6 May 2010
  • 12 bytes (1 word) - 15:02, 10 November 2007
  • #REDIRECT [[Information management/Related Articles]]
    53 bytes (5 words) - 10:31, 2 February 2012
  • {{r|Classified information}}
    686 bytes (86 words) - 21:24, 30 November 2013
  • ...r]], illustrating both sides of the debate whether [[science]] experiences information overload in the era of the [[World Wide Web]] *[http://web2expo.blip.tv/file/1277460 It's Not Information Overload. It's Filter Failure.] &mdash; presentation by [[Clay Shirky]] at
    782 bytes (105 words) - 19:33, 9 December 2010
  • #REDIRECT [[Warfighter Information Network–Tactical]]
    55 bytes (5 words) - 12:03, 21 March 2009
  • 93 bytes (10 words) - 07:12, 24 December 2009
  • ...les individuals and groups to demand that the government review designated information that is being withheld from public release. Comparable laws exist in severa ...cy (foreign policy)|foreign policy]] and are in fact properly [[classified information|classified]] pursuant to such [[Executive Order]];
    3 KB (476 words) - 12:56, 12 April 2011
  • {{r|Information theory}}
    705 bytes (93 words) - 18:15, 2 February 2011
  • ...and information security, such that it meets the criteria for [[classified information]] subject to [[compartmented control system]]s.<ref name=DCID>{{citation |title =Physical Security Standards for Sensitive Compartmented Information Facilities
    4 KB (639 words) - 05:49, 8 April 2024
  • ...ture for a variety of [[routing|routed]] military networks, the '''Defense Information Systems Network (DISN)''' was also an incremental replacement of transmissi ...the [[transportable]] and [[mobile]] transmission systems in [[Warfighter Information Network-Tactical]], it interconnects fixed locations that connect to WIN-T
    1 KB (151 words) - 10:20, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Information retrieval]]. Needs checking by a human.
    593 bytes (74 words) - 17:26, 11 January 2010
  • Auto-populated based on [[Special:WhatLinksHere/Information theory]]. Needs checking by a human.
    830 bytes (103 words) - 14:41, 18 March 2024
  • 200 bytes (26 words) - 23:01, 21 January 2010
  • #REDIRECT [[User:Youjun Wang/technical information]]
    52 bytes (6 words) - 15:58, 18 April 2009
  • ...n which the various enterprise networks, of varying levels of [[classified information|security classification]], are mapped as [[routing|routed networks]]. ...nstant progression in both technology and bandwidth. Within the '''Defense Information Systems Network (DISN)''', transmission networks may be terrestrial, satell
    2 KB (319 words) - 21:41, 25 June 2010
  • 136 bytes (17 words) - 04:20, 9 September 2009
  • ...and civilian organizations, other government agencies, and allied nations; information is at the [[military strategy|strategic/theater]] and [[operational art|ope
    367 bytes (44 words) - 09:19, 15 September 2009
  • [[Information]] generated by actors within the [[public sector]] of an [[economy]].
    119 bytes (14 words) - 17:26, 26 April 2010
  • 29 bytes (3 words) - 21:08, 21 January 2007
  • {{r|information science}} {{r|information overload}}
    673 bytes (101 words) - 10:31, 2 February 2012
  • 409 bytes (54 words) - 16:45, 6 July 2009
  • ...ate [[rear admiral|Rear Admiral]] Gene LaRocque, the '''Center for Defense Information (CDI)''' is a think tank that monitors the U.S. defense establishment. A nu ...World Security Institute]], whose divisions include the Center for Defense Information, [[International Media]], the [[Pulitzer Center on Crisis Reporting]], [[Az
    1 KB (157 words) - 11:47, 19 March 2024
  • 12 bytes (1 word) - 23:43, 16 February 2008
  • {{r|Information security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • 127 bytes (15 words) - 22:17, 28 May 2008
  • ...Through the [[Army Battle Command System]], it interfaces to the [[Global Information Grid]].
    414 bytes (56 words) - 09:50, 22 October 2010
  • The practice of finding information on opponents, or potential opponents.
    109 bytes (13 words) - 23:30, 22 May 2008
  • ...tion''' was created as the [[Information_operations#white propaganda|overt information or "white propaganda"]] agency of the U.S. government.<ref name=EO9182-OWU> | title = Executive Order 9182 Establishing the Office of War Information.
    2 KB (253 words) - 12:48, 2 April 2024
  • 176 bytes (22 words) - 06:49, 17 March 2024
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • ...ed States public information source, conducting what today is called the [[information operations#psychological operations|"white propaganda" aspect of psychologi
    273 bytes (33 words) - 16:21, 9 September 2008

Page text matches

  • ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privile
    299 bytes (36 words) - 11:15, 6 May 2010
  • ...panda/37640.htm Giant Panda] - China Internet Information Center - images, information and links from China, in English *[http://www.pandaclub.net Panda Club] - information from the [[Wolong National Nature Reserve]] in [[Sichuan]]
    287 bytes (42 words) - 03:00, 30 October 2007
  • ...g/ Information Resources Management Association] - the USA association for information managers. * [http://www.aslib.co.uk/ Aslib] - the UK association for information management.
    2 KB (222 words) - 10:31, 2 February 2012
  • In ''[[information science]]'', the organizational structure of information.
    76 bytes (10 words) - 09:23, 17 April 2011
  • ...(information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • ...ry, government documents, especially [[classified information|declassified information]]
    197 bytes (20 words) - 18:40, 18 November 2009
  • ...tion in a [[compartmented control system]] such as Sensitive Compartmented Information (SCI) or Special Access Program (SAP)
    306 bytes (38 words) - 11:45, 16 July 2008
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • * [http://www.worldcoal.org/coal_info.asp Coal Information] From website of the World Coal Institute. ...ww.uky.edu/KGS/coal/coal_mining.htm Methods of Mining] Excellent source of information on coal mining methods.
    851 bytes (113 words) - 10:55, 22 October 2010
  • ...magnetic signal transmission, the basic information-free signal onto which information is modulated.
    146 bytes (16 words) - 17:05, 26 May 2008
  • ====Places with more information====
    542 bytes (70 words) - 13:37, 28 May 2009
  • In [[information security]], the assurance that data retrieved from an information system has the same meaning as when it was entered
    169 bytes (24 words) - 15:24, 30 September 2009
  • ...or subsequent analysis, and assigning probabilities of accuracy to the raw information
    312 bytes (39 words) - 10:14, 26 July 2008
  • ...ibe the format of managed information, that being the role of [[Management Information Base]] specifications
    341 bytes (48 words) - 10:29, 25 September 2008
  • ...[http://www.itl.nist.gov/iaui/894.02/related_projects/muc/ Introduction to Information Extraction]
    269 bytes (32 words) - 08:12, 14 September 2013
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...ain strategic understanding, to detect anomalies, or to actively probe for information
    196 bytes (24 words) - 12:30, 22 June 2009
  • ...y]] over [[electromagnetic radiation]] in free space (i.e., wireless). The information is [[modulation|modulated]] onto a [[carrier wave]]
    261 bytes (33 words) - 12:24, 25 May 2008
  • ...ogrammers and end users to enter information into computers and to look up information which is already in them.
    174 bytes (26 words) - 08:51, 19 November 2011
  • ...r]], illustrating both sides of the debate whether [[science]] experiences information overload in the era of the [[World Wide Web]] *[http://web2expo.blip.tv/file/1277460 It's Not Information Overload. It's Filter Failure.] &mdash; presentation by [[Clay Shirky]] at
    782 bytes (105 words) - 19:33, 9 December 2010
  • ...on and dissemination of literature or information - the activity of making information available for public view.
    172 bytes (23 words) - 18:48, 11 August 2009
  • ...ly for transient information but sometimes for permanent or semi-permanent information such as "boot" data for initialization
    226 bytes (28 words) - 16:18, 18 March 2009
  • ==General information== ===Production information===
    1 KB (161 words) - 03:37, 4 April 2017
  • {{r|Information theory}} ===Information theory===
    761 bytes (97 words) - 18:05, 3 March 2010
  • ==Further information==
    432 bytes (63 words) - 15:24, 15 December 2013
  • ...pected of war crimes were not prosecuted in exchange for information, such information on the [[Soviet Union]]
    235 bytes (33 words) - 14:18, 14 September 2009
  • ...g aware of all relevant information in one's environment, prioritizing the information, and not being distracted by irrelevancies
    181 bytes (24 words) - 04:31, 2 February 2011
  • ...ica.org/public/breeds/oc/intro.php The International Cat Association breed information.] *[http://www.iams.com/pet-health/cat-breeds/ocicat IAMS Ocicat breed information]
    395 bytes (55 words) - 23:48, 7 December 2011
  • ...pueblo.gsa.gov] (the [[Federal citizen information center|Federal Citizen Information Center]])
    531 bytes (73 words) - 00:37, 14 September 2013
  • ==Official government information about amateur radio licensing and operating== ...rvices/index.htm?job=service_home&id=amateur FCC] Official U.S. government information about amateur radio, from the Federal Communications Commission, the offici
    1 KB (158 words) - 12:49, 11 October 2009
  • ...gy/BVHomePage.html The Big Picture Book of Viruses] - Pictures and general information on many viruses * [http://www.vbrc.org Detailed genomic and bioinformatic information about Category A, B, and C priority pathogens at NIH-funded database].
    823 bytes (115 words) - 02:48, 27 May 2008
  • ===For additional information===
    671 bytes (93 words) - 19:34, 27 June 2008
  • ...l Library of Information Science and Technology, an open access archive of Information Sciences materials ...vest.sir.arizona.edu DL-Harvest] DL-Harvest, an open access aggregator for Information Sciences
    1 KB (210 words) - 07:20, 12 February 2009
  • ...ated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC.
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...isclosure, including means for protecting personal privacy and proprietary information." <ref>44 USC 3542</ref> ...ure of contents. In a military context, however, the very existence of the information, and of its transmission, must remain secret against the threats of [[traff
    725 bytes (96 words) - 13:27, 30 September 2009
  • {{r|Information security}} {{r|RADIUS (information security)}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...ed States public information source, conducting what today is called the [[information operations#psychological operations|"white propaganda" aspect of psychologi
    273 bytes (33 words) - 16:21, 9 September 2008
  • Information on the International Mathematical Olympiad: Information on the mathematical Olympiad process in India:
    702 bytes (74 words) - 11:27, 25 April 2008
  • * [[Entropy (information theory)|Entropy]] In information theory
    110 bytes (11 words) - 06:57, 24 September 2013
  • ...ency''', is the basic information-free [[electromagnetic wave]] onto which information is [[modulation|modulated]].
    229 bytes (26 words) - 08:40, 11 December 2009
  • ...carries the bulk of [[classified information]], limited to a [[classified information#General classification|security classification]] of SECRET.
    245 bytes (29 words) - 10:56, 15 July 2008
  • ...s (physical and psychosocial) through [[Consumer health information|health information]], preventive programs, and access to [[medical care]].([[National Library
    282 bytes (32 words) - 07:58, 20 June 2011
  • ...business is often defined as the department that does various things with information.<ref>[http://www.thefreedictionary.com/administration Free Dictionary]</ref The four aformentioned categories of information-related tasks are:
    1 KB (181 words) - 04:01, 8 November 2011
  • ...tl/index.html Periodic Table Live!] Allows one to explore a broad range of information about the elements, their reactions, their properties, their structures and ...s and structure; nuclear properties; reactivity indexes; health and safety information.
    987 bytes (131 words) - 16:44, 8 May 2010
  • ==Information sites==
    477 bytes (70 words) - 14:44, 8 October 2009
  • ...nounced by governments to influence target audience, in a broad context of information operations. ...propaganda|white]], [[Information operations#Gray propaganda|gray]] and [[Information operations#Black propaganda| black]]. White is acknowledged by the governme
    867 bytes (123 words) - 14:13, 6 April 2024
  • ...covering a wide range of [[information operations|activities]] to present information favorable to the [[State of Israel]]
    253 bytes (33 words) - 17:06, 20 October 2009
  • ...false sense of security, because in reality the product does not make the information any more secure
    237 bytes (35 words) - 14:55, 25 October 2008
  • .... Herman Hollerith is credited with the invention of the media for storing information from the United States Census of 1890.
    206 bytes (30 words) - 02:44, 18 March 2009
  • {{r|Information security}} {{r|Identification (information security)}}
    368 bytes (39 words) - 05:38, 15 March 2024
  • ...st improper information modification or destruction, and includes ensuring information non-repudiation and authenticity."<ref>44 USC 3542</ref> '''Nonrepudiation''' is an aspect of the processing of information. Sender nonrepudiation means that one cannot deny creating a transaction, a
    844 bytes (119 words) - 15:23, 30 September 2009
  • ...te]]s in their [[routing information base]]; they obtain all their routing information from local configuration and [[routing protocol]]s, especially the Border G
    283 bytes (38 words) - 15:00, 20 March 2024
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • *[http://www.leukemia-lymphoma.org/all_page?item_id=7049 Information about ALL] from the [[Leukemia & Lymphoma Society]] *[http://www.cancerhelp.org.uk/help/default.asp?page=32107 Information about ALL] from [[Cancer Research UK]]
    1 KB (206 words) - 22:24, 24 September 2009
  • ...engineering techniques for combining multiple [[bandwidth|low bandwidth]] information channels into a high-bandwidth channel more suitable for actual electronic ...ity of the transmission channel, but it can be safely assumed that all the information channels will not be active at the same time. [[Packet switching]] and [[ro
    2 KB (253 words) - 13:33, 26 February 2010
  • ...tical]] and by a number of countries; it provides up to 34 Mbps of digital information transfer compatible with the [[Joint Tactical Radio System]] architecture
    330 bytes (44 words) - 20:11, 24 January 2009
  • ...acific Amphetamine - Type Stimulant Information Centre] - a very extensive information source managed by the United Nations Office on Drugs and Crime *[http://www.quihn.org.au/illicit_drug_use_information.htm Information and harm reduction strategies for amphetamines and other illicit drugs]
    870 bytes (110 words) - 12:52, 1 January 2008
  • ===Generally reliable information from experts=== * [http://www.skatfox.com/ Skatfox]. Information on folklore surrounding the game.
    1 KB (143 words) - 01:55, 17 December 2009
  • **AC-20, [[external information systems]] *[[Information system maintenance|Maintenance]]
    2 KB (178 words) - 11:59, 20 September 2009
  • {{r|Information}} *[[List of library and information science programs]]
    528 bytes (63 words) - 12:57, 13 November 2014
  • ...y explicit routes in its [[routing information base]]; it gets all routing information from local configuration and dynamic [[routing protocol]]s. Its tables cont ...ll run the Border Gateway Protocol as its major means of acquiring routing information.
    535 bytes (82 words) - 15:00, 20 March 2024
  • ====Places with more information====
    1,010 bytes (132 words) - 11:40, 28 May 2009
  • ...such as the use of biological molecules to encode, manipulate and retrieve information, allowing the development of organic memory circuits.
    363 bytes (47 words) - 02:40, 24 June 2008
  • ..., who may participate, locations, and phone numbers for more details. This information should be used in conjunction with advice from health care professionals.
    419 bytes (59 words) - 11:44, 26 June 2011
  • ====Places with more information====
    1 KB (154 words) - 11:32, 28 May 2009
  • ...structures to form a new structure, a ''blend'', which combines selective information from those structures into a new, emergent, mental space. ...facts about Victoria and the atom bomb, whereas the blend contains gestalt information which is greater than its parts.
    1 KB (199 words) - 13:48, 18 February 2024
  • ==Further information==
    650 bytes (91 words) - 20:46, 30 March 2010
  • ...operations; global network operations of the [[Global Information Grid]], information operations, [[ballistic missile defense]], and reduction of [[weapons of ma
    459 bytes (53 words) - 14:13, 6 April 2024
  • A means of combining human-readable information with [[metadata]] about the information, with special reference to the ability to "link" or "jump" to subjects of i
    416 bytes (60 words) - 06:33, 19 April 2011
  • ==Language information==
    625 bytes (100 words) - 05:11, 31 May 2009
  • ...rg/ Drugs treatment] Online drug information in an A to Z format. Includes information of side effects, warnings, overdose and drug interactions. * [http://www.fda.gov/cder/drug/DrugSafety/DrugIndex.htm Consumer drug information from the FDA]
    1 KB (166 words) - 07:42, 12 February 2009
  • *[[Geographic information system]]s ==Scientific Visualization vs. Information Visualization==
    2 KB (236 words) - 09:18, 18 February 2008
  • {{r|Intelligence (information gathering)}} {{r|Classified information}}
    320 bytes (34 words) - 12:10, 19 August 2009
  • ...e or more '''intermediate frequencies''' between the transmission and user information frequencies. ...tains the information to be extracted. Assuming amplitude modulation, the information in the modulated signal came from the sum and difference between the ''beat
    974 bytes (143 words) - 16:23, 30 March 2024
  • *Edward R. Tufte. ''Envisioning information''. 1990, Graphics Press. *Edward R. Tufte. ''The Visual Display of Quantitative Information''. 2001, Graphics Press.
    377 bytes (43 words) - 16:20, 17 February 2008
  • #Redirect [[Information theory]]
    32 bytes (3 words) - 14:41, 10 May 2008
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • #REDIRECT [[Information management]]
    36 bytes (3 words) - 10:30, 2 February 2012
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • *http://www.geo.arizona.edu/geo5xx/geo527/Andes/intro.html - Geological information.
    97 bytes (15 words) - 14:44, 12 December 2010
  • #Redirect [[Classified information]]
    36 bytes (3 words) - 11:53, 22 May 2008
  • {{r|Classified information}} {{r|Sensitive Compartmented Information Facility}}
    399 bytes (46 words) - 19:04, 28 February 2010
  • {{r|Classified information}} {{r|Defense Information Systems Network}}
    292 bytes (39 words) - 08:28, 28 July 2010
  • ...or drafting, issuing, and coordinating procurement, financial management, information, and regulatory policies, as well as the process of administrative manageme ===Office of e-Government and Information Technology===
    1 KB (135 words) - 14:07, 20 September 2009
  • ''Section'' Herbal information ''Section'' Eclectic herbal information
    738 bytes (91 words) - 17:42, 23 October 2007
  • #REDIRECT [[Global Information Grid]]
    37 bytes (4 words) - 16:02, 29 August 2008
  • ...petroleumbazaar.com/naphtha/naphtha1.htm Naphtha] (Contains some excellent information)
    114 bytes (13 words) - 11:36, 4 February 2008
  • #REDIRECT [[U.S. Information Agency]]
    37 bytes (5 words) - 23:10, 21 January 2010
  • #REDIRECT [[Information management/Definition]]
    47 bytes (4 words) - 10:31, 2 February 2012
  • {{:Information overload/Related Articles}}
    42 bytes (4 words) - 17:09, 12 April 2010
  • #REDIRECT [[U.S. Information Agency]]
    37 bytes (5 words) - 16:28, 4 February 2010
  • #REDIRECT [[Information management/Bibliography]]
    49 bytes (4 words) - 10:32, 2 February 2012
  • * [http://project.cyberpunk.ru/idb/ Cyberpunk Information Database]
    81 bytes (9 words) - 09:14, 14 November 2007
  • #REDIRECT [[Information asymetry/Definition]]
    45 bytes (4 words) - 07:44, 27 March 2012
  • #REDIRECT [[Warfighter Information Network–Tactical]]
    55 bytes (5 words) - 12:03, 21 March 2009
  • #REDIRECT [[Warfighter Information Network–Tactical]]
    55 bytes (5 words) - 19:47, 24 January 2009
  • {{r|Information security}} {{r|RADIUS (information security)}}
    231 bytes (29 words) - 13:28, 1 February 2009
  • ====Hypnosis information sites==== [http://www.hypnosisandsuggestion.org HypnosisAndSuggestion.org] Information about the science behind hypnosis and suggestion
    1 KB (170 words) - 12:47, 2 March 2008
  • ...ryption''' project, better known as '''NESSIE''', was a project within the Information Society Technologies (IST) Programme of the [[European Commission]] which r The [https://www.cosic.esat.kuleuven.be/nessie/ web site] has extensive information,including the project's [https://www.cosic.esat.kuleuven.be/nessie/Bookv015
    548 bytes (78 words) - 05:48, 8 April 2024
  • {{r|Information assurance}} {{r|Classified information||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)