Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 51 - 60 of 1060575 documents for prestamos de vivienda banco santander Visitar el sitio WWWLOAN24HXYZ tipos de prestamos en infonavit requisitos para credito fonacot slp prestamos sin checar buro mty ley de prestamos del issste creditos para construccion de vivienda en queretaro prestamos de dinero rapido en veracruz creditos personales en banco hsbc prestamos elektra mazatlan creditos pymes 2021 necesito dinero urgente playa del carmen prestamos prosefi tijuana formato prestamos personales issste prestamos de dinero de fonacot
Relevance
Date
  1. https://www.nist.gov/system/files/documents/2020/09/09/ndncomm2020__abstracts.pdf

    https://www.nist.gov/system/files/documents/2020/09/09/NDNcomm2020__abstracts.pdf
    Session 1: NDN Trial Deployments Publishing Genomics Datasets into NDN Testbed and Integrating with Cloud Workflows F. Alex Feltus Clemson University Susmit Shannigrahi Tennessee Tech University Stephen Ficklin Washington State University Rini Pauly Clemson University Cole Mcknight Clemson University David Reddick Tennessee Tech University Tyler Biggs Washington State University Cameron Ogle Clemson University Background The genomics community has made astronomical progress in recent decades. Thanks to medium-cost DNA sequencing machines, the genomics community is rapidly approaching the computational petascale at universities and research centers. For example, in 12 years the SRA repository at the National Center for Biotechnology Information (NCBI) ...
  2. DOE McHenry motors.pptx

    https://www.nist.gov/system/files/documents/pml/high_megawatt/McHenry-DOE-McHenry-motors.pdf
    1 1 Amorphous and Nanocomposite Magnets for Energy-efficient Electric Motors Michael McHenry1, Alex Leary1, Vincent DeGeorge1, Josefina Silveyra1,2 1 Carnegie Mellon University 2 Univ. of Buenos Aires – CONICET, Argentina 2 Outline •  Motivation: Electric motors, energy, hard magnets •  Soft magnets: steel vs amorphous and nanocomposites •  Parallel Path Magnetic Technology •  Brushless permanent magnet motors •  Conclusions & Future work 3 Magnetic Materials for Energy and Power Applications. Soft Magnetic Materials Power Electronics Electric Vehicles Hard Magnets Motors Critical Materials Active Cooling Extreme Environments Interconnects Packaging Sensing ...
  3. The Whole is Greater...

    https://csrc.nist.gov/CSRC/media/Presentations/The-Whole-is-Greater/images-media/day1_trusted-computing_200-250.pdf
    Sugumar Govindarajan Security Architect, Intel Server BIOS John Loucaides Security Researcher, Intel Product Security Incident Response Team Contributions from Aaron Frinzell, Intel Server BIOS Legal information Intel technologies, features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction se...
  4. https://www.nist.gov/system/files/documents/2016/09/08/nistcloudcomputing_agenda.pdf

    https://www.nist.gov/system/files/documents/2016/09/08/NISTCloudComputing_Agenda.pdf
    Please take time to visit our Exhibitors in the NIST Hall of Flags 8:00 AM Registration and Networking 8:30 AM Welcome: Dr. Willie May, Under Secretary of Commerce for Standards and Technology & Director, NIST 8:35 AM Keynote: Dr. Ron Ross, NIST Fellow, Computer Security Division, NIST Session A: Setting The Stage for Cloud and the Interconnected World 9:30 AM NCCP Welcome – Dr. Robert Bohn, NCCP Technical Program Manager, NIST 9:35 AM Service Level Agreements (SLAs)/Metrics - John Messina NCCP Senior Member, NIST 9:55 AM Cloud Computing Security – Dr. Michaela Iorga, NCCP Senior Security Lead, NIST 10:15 AM Break Need for USG SLA Guidance - Robert Bohn, NIST Moderator 10:30 AM Timothy Howard, Program Manager, Anta...
  5. Microsoft Word - Rapid7 Comments to CENC RFI Sep 9 2016.docx

    https://www.nist.gov/system/files/documents/2016/09/16/rapid7_rfi_response.pdf
    Comments to “Information on Current and Future States of Cybersecurity in the Digital Economy” Docket Number: 160725650-6650-01 Sep. 9, 2016 Rapid7 submits these comments in response to the President’s Commission for Enhancing National Cybersecurity’s (CENC) request for public input on "Current and Future States of Cybersecurity in the D...
  6. IT Asset Management

    https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-itam-nist-sp1800-5b.pdf
    NIST SPECIAL PUBLICATION 1800-5B IT Asset Management Volume B: Approach, Architecture, and Security Characteristics Michael Stone Leah Kauffman, Editor-in-Chief National Cybersecurity Center of Excellence Information Technology Laboratory Chinedum Irrechukwu Harry Perper Devin Wynne The MITRE Corporation McLean, VA September 2018 This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5 The first draft of this publication is available free of charge from: https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-itam-nist-sp1800-5-draft.pdf NIST SP 1800-5B: IT Asset Management i Th is p u b licatio n is availab le free o f c...
  7. Draft Special Publication 800-101 Revision 1, Guidelines on Mobile Device Forensics

    https://csrc.nist.gov/CSRC/media/Publications/sp/800-101/rev-1/final/documents/draft_sp800_101_r1.pdf
    The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 800-101 Revision 1 Title: Guidelines on Mobile Device Forensics Publication Date: 05/15/2014 • Final Publication: http://dx.doi.org/10.6028/NIST.SP.800-101r1 (which links to http://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-101r1.pdf). • Related Information on CSRC: http://csrc.nist.gov/publications/PubsSPs.html#800-101 • Information on other NIST Computer Security Division publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document:...
  8. Discussion Draft Preliminary Cybersecurity Framework, August 28, 2013

    https://www.nist.gov/system/files/documents/itl/discussion-draft_preliminary-cybersecurity-framework-082813.pdf
    1 Discussion Draft of the Preliminary Cybersecurity Framework Discussion Draft of the Preliminary Cybersecurity Framework August 28, 2013 5 10 15 20 25 30 35 Discussion Draft of the Preliminary Cybersecurity Framework 2 3 A Discussion Draft of the Preliminary Cybersecurity Framework for improving critical 4 infrastructure cybersecurity is now available for review. This draft is provided by the National Institute of Standards and Technology (NIST) in advance of the Fourth Cybersecurity 6 Framework workshop on...
  9. Issue in Software Testing with Model Checkers

    https://csrc.nist.gov/CSRC/media/Projects/Automated-Combinatorial-Testing-for-Software/documents/dsn-2003.pdf
    Issues in Software Testing with Model Checkers Vadim Okun Paul E. Black National Institute of Standards and Technology Gaithersburg, MD 20899 {vokun1,paul.black}@nist.gov I. GE N E R AT I N G S O F T WA R E T E S T S Most software developers consider formal methods too hard and tedious to use in practice. Instead of using formal methods, developers test software. Model checking is a “light-weight” formal method to check the truth (or falsity) of statements. We use the SMV model checker as part of a highly automated test generation tool, which we hope will motivate practitioners to use formal methods more. For instance, an organization is more likely to expend the considerable effort to develop a formal specification if, with a l...
  10. Early Computer Security Papers [1970-1985]

    https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/early-cs-papers-1970-1985.pdf
    Early Computer Security Papers, Part I These papers are unpublished, seminal works in computer security. They are papers every serious student of computer security should read. They are not easy to find. The goal of this collection is to make them widely available. Background and Organization Computer security as a discipline was first studied in the early 1970s, although the issues had influenced the development of many earlier systems such as the Atlas system and MULTICS. Unfortunately, many of the early seminal papers are often overlooked as developers (and sometimes researchers) rediscover problems and solutions, leading to wasted time and development effort. The information in these papers provides a historical record of how computer s...
Showing results 51 - 60 of 1060575 documents for prestamos de vivienda banco santander Visitar el sitio WWWLOAN24HXYZ tipos de prestamos en infonavit requisitos para credito fonacot slp prestamos sin checar buro mty ley de prestamos del issste creditos para construccion de vivienda en queretaro prestamos de dinero rapido en veracruz creditos personales en banco hsbc prestamos elektra mazatlan creditos pymes 2021 necesito dinero urgente playa del carmen prestamos prosefi tijuana formato prestamos personales issste prestamos de dinero de fonacot