Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Dan Craig"'
Autor:
Andrew Jameson, David MacMahon, Howard Isaacson, Andrew Siemion, J. Emilio Enriquez, Matt Lebofsky, Steve Croft, John Sarkissian, Nectaria A. B. Gizani, Greg Hellbourg, Philip G. Edwards, David DeBoer, Danny C. Price, L. Ball, Dan Craig, Douglas C.-J. Bock, John Reynolds, James Green, B. Preisig, Dan Werthimer, S. W. Amy, Vishal Gajjar, Stacy Mader, Griffin Foster, Mal Smith
Publikováno v:
Publications of the Astronomical Society of Australia, 35, 1-10
Publications of the Astronomical Society of Australia, 35, pp. 1-10
Publications of the Astronomical Society of Australia, 35, pp. 1-10
Breakthrough Listen is a ten-year initiative to search for signatures of technologies created by extraterrestrial civilizations at radio and optical wavelengths. Here, we detail the digital data recording system deployed for Breakthrough Listen obser
Publikováno v:
Technology Innovation Management Review, Iss August 2013: Cybersecurity, Pp 5-14 (2013)
An engine designed to convert innovation into a country’s global leadership position in a specific product market is examined in this article, using Canada and cybersecurity as an example. Five entities are core to the innovation engine: an ecosyst
Externí odkaz:
https://doaj.org/article/62144c19f1de42e4b3a80f15196895de
Publikováno v:
Technology Innovation Management Review, Iss July 2013: Cybersecurity, Pp 34-41 (2013)
We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-
Externí odkaz:
https://doaj.org/article/82e262a0bebd4ce4933f0d2595659957
Publikováno v:
Technology Innovation Management Review, Iss July 2013: Cybersecurity, Pp 12-18 (2013)
This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges b
Externí odkaz:
https://doaj.org/article/f81d4a575253483e86bd98f70d30daa0