je.st
news
Tag: threats
Nike: Analysis of Strengths, Weaknesses, Opportunities, Threats
2015-03-25 00:36:04| Footwear - Topix.net
The business outlook at Nike is bright. Overall demand trends have been favorable in most regions, for both athletic footwear and apparel.
Tags: analysis
opportunities
nike
threats
Twitter Helps Users Report Threats to Police
2015-03-18 02:02:54| PC Magazine Software Product Guide
Details of the bullying tweet will arrive in your inbox, ready to share with local law enforcement.
Tags: report
users
police
helps
Small-time security threats bigger concern
2015-03-09 06:38:12| Auto Dealers - Topix.net
The biggest threats to a dealership's data aren't Russian hackers breaking through electronic firewalls or robots trying a thousand passwords on security codes until they finally crack into the system. It's more likely the mundane stuff that will cause a breach that enables personal consumer data to slip out of the store, said Brad Miller, director of legal and regulatory affairs for the National Automobile Dealers Association.
Tags: security
concern
bigger
threats
Climate change poses serious threats to food distribution
2015-03-05 15:00:00| Climate Ark Climate Change & Global Warming Newsfeed
FERN: By now there has been a steady stream of news about climate changes impacts on food production. Heat waves, drought, and wildfire are damaging harvests in California, Australia and Brazil. Warming and acidifying oceans threaten seafood stocks. Rising temperatures are causing declines in crops as different as wheat and cherries, while extreme precipitation and floods have destroyed crops across the US and Europe. Increasing temperatures and CO2 levels are reducing the nutritional value of grasses...
Tags: change
food
distribution
climate
Secure Network Framework counters mobile, server cyber threats.
2015-02-27 14:30:56| Industrial Newsroom - All News for Today
Built around 4 main features, SafeMobile provides security framework to meet cyber threats on mobile client and main server. Cyber Secure Gateway secures mobile traffic by ensuring authentication, identity, and encryption; Cyber Secure Mobile Client enables mobile applications development using secure framework; Secure Certification offers authority and workflow designed to issue certificate for mobile environment; and Cyber Device Management provides secure mobile device storage/provisioning.
Tags: network
mobile
server
secure
Sites : [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] next »