Search results

Jump to navigation Jump to search
Results 1 – 21 of 2,155
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...r=Microsoft |date=2003-06-10 |accessdate=2019-03-11}}</ref> In 2004, GECAD Software reshaped its entire business and became GECAD Group. ...is focused primarily on software and hi-tech companies, including security software, cloud technologies, eCommerce, cryptocurrencies, and payment methods. In 2 ...
    2 KB (279 words) - 02:58, 9 July 2022
  • {{Short description|American cryptographic security company}} | industry = voice and video cryptographic security company ...
    1 KB (172 words) - 02:29, 19 December 2024
  • ...computing]] &middot; [[:Category:Software|Software]] &middot; [[:Security|Security]] &middot;[[:Category:Computing|More...]] ...:Electronic circuits|Circuits]] &middot; [[:Category:Electronics companies|Companies]] &middot; [[:Category:Electrical connectors|Connectors]] &middot; [[:Categ ...
    5 KB (512 words) - 13:49, 22 November 2016
  • {{Short description|American security software company}} | industry = Computer software <br /> [[Security software]] ...
    6 KB (764 words) - 09:28, 24 March 2025
  • ==Companies== * [[SONAR (Symantec)]], a technology used in Norton-security software ...
    1 KB (189 words) - 19:58, 16 June 2025
  • ...mitomo Computer Service Corporation <small>(1969–2005)</small><br>Sumitomo Computer System Corporation <small>(2005–2011)</small> ...unbulleted list|[[System integration]]|[[Information security]]|[[Computer software]]}} ...
    5 KB (584 words) - 03:08, 29 December 2024
  • | industry = [[Software development]] ...duling, knowledge management and discovery, decision support, and computer security and reliability. It was founded in 1988 and is headquartered in [[San Mateo ...
    2 KB (269 words) - 03:40, 24 January 2025
  • *[[Tebibit]] (Tib), a unit of information used to quantify computer memory or storage capacity *[[Tebibyte]] (TiB), a unit of information used to quantify computer memory or storage capacity ...
    1 KB (192 words) - 13:08, 7 August 2024
  • Uccel's "big-ticket item" claim to fame was software called UCC-1/TMS ([[Tape Management System]]), an [[IBM mainframe]] product ...products "Optimizer" and "TLMS") and Value Software, plus CA-Top Secret (security / mainframe [[discretionary access control]]). ...
    2 KB (324 words) - 05:21, 14 March 2025
  • {{Short description|Syrian computer magazine}} |category = [[Computer magazines|Computer magazine]] ...
    3 KB (439 words) - 19:40, 2 August 2023
  • {{Infobox software | license = [[Proprietary software|Proprietary]] [[commercial software]], free for 10 users ...
    5 KB (649 words) - 14:47, 3 March 2025
  • {{Short description|Computer software company}} | industry = Computer Software ...
    5 KB (699 words) - 03:13, 1 April 2025
  • ...in order to reduce the risk of data loss, corruption, malware, errors, and security breaches. * [[Security]] features of the network turn off. ...
    3 KB (391 words) - 07:18, 5 September 2022
  • {{Short description|Spanish cybersecurity software company}} | name = Panda Security SL ...
    10 KB (1,232 words) - 01:50, 21 April 2025
  • {{Short description|Computer hardware devices to reduce e-mail spam}} ...instant messaging (also called "spim") and are deployed at the [[Gateway (computer networking)|gateway]] or in front of the [[mail server]]. They are normally ...
    4 KB (549 words) - 21:47, 28 August 2024
  • {{Short description|Chinese computer technology company}} | name = Insyde Software<br>系微公司 ...
    8 KB (985 words) - 22:59, 20 September 2024
  • ...).<ref name=Computerworld>{{cite news |first=Jaikumar |last=Vijayan |title=Security Vendors Say Merger Will Give Them More Financial Heft | publisher=Computerw ...mentum by Signing Multiple New Federal Customers and Earning International Security Certification | publisher=Business Wire | date=2006-07-27 }}</ref> ...
    2 KB (301 words) - 00:35, 28 February 2025
  • {{Short description|American-based computer technology consortium}} ...hat software does and does not run on a system by refusing to run unsigned software.<ref>{{cite web |url=https://www.trustedcomputinggroup.org/faq/TPMFAQ/ |tit ...
    6 KB (829 words) - 23:24, 5 June 2025
  • {{Short description|American computer security researcher and programmer}} *[[Computer Oracle and Password System]] (COPS) ...
    5 KB (618 words) - 19:09, 6 January 2025
  • ...to and from a computer, permitting or denying communications based on a [[security policy]].<ref>[http://www.makeitsecure.org/en/personal-firewall.html] Perso ...computing)|router]] or [[proxy server]]. Hence, personal firewalls allow a security policy to be defined for individual computers, whereas a conventional firew ...
    7 KB (1,102 words) - 08:14, 15 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)