Search results

Jump to navigation Jump to search
  • ...rchestrates computing, networking, and storage infrastructure on behalf of user workloads.</p> ...d a specific configuration through its RESTful API which it exposes to the user, and the “master” is then responsible for running this configuration a
    35 KB (4,861 words) - 15:11, 14 February 2020
  • ...Confluence link: [https://confluence.ssc-spc.gc.ca/display/JIRAINTAKE/New+User+QW+License+Request]. You will receive an email with instructions. ...vernance roles determine what Governance Actions can be taken based on the user and the state of the diagram
    9 KB (1,282 words) - 11:27, 13 September 2021
  • * '''If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding techno
    11 KB (1,455 words) - 12:17, 7 July 2020
  • * '''If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding techno
    11 KB (1,459 words) - 12:24, 7 July 2020
  • * User testing ongoing for CERB and Contact Us (Service Canada)
    4 KB (624 words) - 08:53, 20 October 2020
  • In order to optimize the business, the Digital Strategy will position the user first in an open, collaborative and accessible way using digital solutions
    3 KB (400 words) - 14:10, 27 July 2020
  • ...s, and text. CUIs can cut through the potentially complicated steps that a user must go through to accomplish a task. This can be in the form of retrieving ...stance that would normally be answered by a live agent such as resetting a user’s password or obtaining an activation code for a login process.<ref>Reddy
    40 KB (5,813 words) - 14:50, 14 February 2020
  • ...r is kept in hot storage and can be ordered and delivered within the hour (user volumes, depending). As an active mission, historical RCM data of 30M resol ...is kept in cold storage and can be ordered and delivered within 12 hours (user volumes, depending). Offline data is first made Online and then handled as
    21 KB (3,094 words) - 17:14, 14 February 2024
  • ...asure, secure file transfer, SIEM, orchestration, automation and response, user and entity behavior analytics, vulnerability management ...</nowiki>), published road maps, published runbooks, automation libraries, user guides, embedded client execs, planned vs. unplanned outages feeds
    22 KB (3,060 words) - 10:00, 23 December 2020
  • ...sure, secure file transfer, SIEM, orchestration, automation and response, user and entity behavior analytics, vulnerability management .../nowiki>), published road maps, published runbooks, automation libraries, user guides, embedded client execs, planned vs. unplanned outages feeds
    23 KB (3,140 words) - 09:56, 23 December 2020
  • ...sources are posted on the GC Wiki under “[[GC Web Priorities/User research|User research]]” Ces ressources sont affichées sur GCwiki sous « [[GC Web Priorities/User research|Recherche utilisateur]] ».
    7 KB (991 words) - 10:41, 31 December 2020
  • ...ry and policy compliance, managing security incidents and a degradation in user experiences.</p> ...performance of the cloud-based resources 24/7 to improve productivity and user experiences.<ref>Hein, D. (2019, June 24). <i>[https://solutionsreview.com/
    33 KB (4,467 words) - 15:21, 14 February 2020
  • •       How will user expectations be addressed? ...g the BCM, identify the business problem, and value proposition to address user needs
    32 KB (4,247 words) - 18:17, 7 March 2022
  • ...Nick Pelling first coined the term “Gamification” while he was designing a user interface with game design features.<ref> techopedia (n.d.) <i>[https://www ...ed for big, multinational, and multi-location companies looking for higher user engagement.</p>
    46 KB (6,401 words) - 13:21, 9 April 2020
  • * Identifying trends and user needs for digital strategy for recovery
    6 KB (1,049 words) - 10:53, 29 July 2021
  • * User testing
    3 KB (482 words) - 08:42, 20 October 2020
  • *user authentication combined with a mouse click on some form of acknowledgment b
    25 KB (3,843 words) - 18:28, 13 January 2022
  • ...ieved from inductive automation </ref> Additionally, SCADA can provide the user with warnings by sounding alarms if situations develop into hazardous scena ...an be processed from this point and report are formulated automatically. A user is able to highlight parameters of interest when monitoring. Threshold limi
    26 KB (3,669 words) - 15:44, 14 February 2020
  • ...sulted in a number of incidents (which are often associated with a lack of user knowledge) and a growing risk to aviation safety as well as to people on th -webkit-user-select: none;
    43 KB (5,967 words) - 13:00, 11 July 2019
  • ...the foundation of the government's shift to becoming more agile, open and user-focused. Learn more about the Digital Academy’s products and offerings by
    4 KB (560 words) - 15:15, 17 February 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)