Search results
Jump to navigation
Jump to search
- ...rchestrates computing, networking, and storage infrastructure on behalf of user workloads.</p> ...d a specific configuration through its RESTful API which it exposes to the user, and the “master” is then responsible for running this configuration a35 KB (4,861 words) - 15:11, 14 February 2020
- ...Confluence link: [https://confluence.ssc-spc.gc.ca/display/JIRAINTAKE/New+User+QW+License+Request]. You will receive an email with instructions. ...vernance roles determine what Governance Actions can be taken based on the user and the state of the diagram9 KB (1,282 words) - 11:27, 13 September 2021
- * '''If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding techno11 KB (1,455 words) - 12:17, 7 July 2020
- * '''If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding techno11 KB (1,459 words) - 12:24, 7 July 2020
- * User testing ongoing for CERB and Contact Us (Service Canada)4 KB (624 words) - 08:53, 20 October 2020
- In order to optimize the business, the Digital Strategy will position the user first in an open, collaborative and accessible way using digital solutions3 KB (400 words) - 14:10, 27 July 2020
- ...s, and text. CUIs can cut through the potentially complicated steps that a user must go through to accomplish a task. This can be in the form of retrieving ...stance that would normally be answered by a live agent such as resetting a user’s password or obtaining an activation code for a login process.<ref>Reddy40 KB (5,813 words) - 14:50, 14 February 2020
- ...r is kept in hot storage and can be ordered and delivered within the hour (user volumes, depending). As an active mission, historical RCM data of 30M resol ...is kept in cold storage and can be ordered and delivered within 12 hours (user volumes, depending). Offline data is first made Online and then handled as21 KB (3,094 words) - 17:14, 14 February 2024
- ...asure, secure file transfer, SIEM, orchestration, automation and response, user and entity behavior analytics, vulnerability management ...</nowiki>), published road maps, published runbooks, automation libraries, user guides, embedded client execs, planned vs. unplanned outages feeds22 KB (3,060 words) - 10:00, 23 December 2020
- ...sure, secure file transfer, SIEM, orchestration, automation and response, user and entity behavior analytics, vulnerability management .../nowiki>), published road maps, published runbooks, automation libraries, user guides, embedded client execs, planned vs. unplanned outages feeds23 KB (3,140 words) - 09:56, 23 December 2020
- ...sources are posted on the GC Wiki under “[[GC Web Priorities/User research|User research]]” Ces ressources sont affichées sur GCwiki sous « [[GC Web Priorities/User research|Recherche utilisateur]] ».7 KB (991 words) - 10:41, 31 December 2020
- ...ry and policy compliance, managing security incidents and a degradation in user experiences.</p> ...performance of the cloud-based resources 24/7 to improve productivity and user experiences.<ref>Hein, D. (2019, June 24). <i>[https://solutionsreview.com/33 KB (4,467 words) - 15:21, 14 February 2020
- • How will user expectations be addressed? ...g the BCM, identify the business problem, and value proposition to address user needs32 KB (4,247 words) - 18:17, 7 March 2022
- ...Nick Pelling first coined the term “Gamification” while he was designing a user interface with game design features.<ref> techopedia (n.d.) <i>[https://www ...ed for big, multinational, and multi-location companies looking for higher user engagement.</p>46 KB (6,401 words) - 13:21, 9 April 2020
- * Identifying trends and user needs for digital strategy for recovery6 KB (1,049 words) - 10:53, 29 July 2021
- * User testing3 KB (482 words) - 08:42, 20 October 2020
- *user authentication combined with a mouse click on some form of acknowledgment b25 KB (3,843 words) - 18:28, 13 January 2022
- ...ieved from inductive automation </ref> Additionally, SCADA can provide the user with warnings by sounding alarms if situations develop into hazardous scena ...an be processed from this point and report are formulated automatically. A user is able to highlight parameters of interest when monitoring. Threshold limi26 KB (3,669 words) - 15:44, 14 February 2020
- ...sulted in a number of incidents (which are often associated with a lack of user knowledge) and a growing risk to aviation safety as well as to people on th -webkit-user-select: none;43 KB (5,967 words) - 13:00, 11 July 2019
- ...the foundation of the government's shift to becoming more agile, open and user-focused. Learn more about the Digital Academy’s products and offerings by4 KB (560 words) - 15:15, 17 February 2022