نتایج جستجو برای: ghayyem custodian
تعداد نتایج: 236 فیلتر نتایج به سال:
Standards, as agreed-upon norms and requirements about systems, are essential pillars of enterprise and network operation and interoperability. However, standards themselves often display interoperability, inconsistency and overlap problems partly due to the custodian work groups’ heterogeneity, the politics involved and limited communication and cooperation. This paper proposes and investigate...
In the field of Information Technology, a person who has obligations regarding data security is known as stewardship (data custodian). Data most important part that must be maintained and ensured its security. Therefore, institutions organizations make various efforts in order to ensure process safeguarding maintaining data, so safe can avoid errors acts misuse. This study aims identify documen...
En el presente estudio realizamos un acercamiento a la situación de los escribanos públicos Ciudad Real (España) durante las últimas décadas del siglo XV. El contexto se caracterizaba por una crisis general institución en Castilla y gran reforma promovida monar-quía. Este trabajo fundamenta ordenanzas aprobadas Reyes Católicos año 1489 para crear corporación además diversas cartas remitidas mon...
This article presents a personal journey of a closeknit family from Málaga, Spain who engaged with direct-toconsumer (DTC) genomic testing. Whilst the testing was initiated by one member of the family who works as a genome bioinformatician, none of the remaining family had any prior experience with DTC genetic testing. A thoughtful account, written in the first person, is offered on the experie...
The Hadoop Distributed File System at Yahoo! stores 40 petabytes of application data across 30,000 nodes . The most conventional strategy for data protection—just make a copy somewhere else—is not practical for such large data sets . To be a good custodian of this much data, HDFS must continuously manage the number of replicas for each block, test the integrity of blocks, balance the usage of r...
Designing assistive technological solutions for people with disabilities and older people is fraught with problems due to the number of agencies involved. These problems are compounded by the lack of understanding that can exist between the engineers and the health staff. This lack of understanding can develop into extreme delays in installing the technology and the needs of the person with dis...
We use the bipartite graph representation of longitudinally linked employer-employee data, and the associated projections onto the employer and employee nodes, respectively, to characterize the set of potential statistical summaries that the trusted custodian might produce. We consider noise infusion as the primary confidentiality protection method. We show that a relatively straightforward ext...
Las reflexiones presentadas se enmarcan dentro de los desafíos relacionados con el acceso a archivos, partiendo la premisa que no solo implica hacer archivos disponibles y consultables través recursos tecnológicos, sino también comprender su origen contexto producción. En este sentido, convierte en un proceso mediación, una compleja negociación entre las expectativas usuarios conocimiento espec...
domination of the constitutional revolution made notable alteration in the political, social and cultural affairs of iran's history.among them we can point out to the tendencies towards contributing in public utility and spirit ness and charity affairs already named as alms or pious.it means that religious sympathies, and social patrimony changed from personal to social welfare and communi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید