- Automated Tasking System
- Military: ATS
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Integrated library system — An integrated library system, or ILS, is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed.An ILS is usually comprised of a relational database, software to act … Wikipedia
Signals intelligence operational platforms by nation — This article is a subset article under the main article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with current signals… … Wikipedia
New York Air National Guard — Active 1946 present Country Un … Wikipedia
Special Projects Office-Program Executive Office Command Control Communications Tactical — PEO C3T Special Projects Office Active Country United States Branch Army Type Systems Integration Garrison/HQ Fort Mon … Wikipedia
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Dodd–Frank Wall Street Reform and Consumer Protection Act — Full title An Act to promote the financial stability of the United States by improving accountability and transparency in the financial system, to end too big to fail , to protect the American taxpayer by ending bailouts, to protect consumers… … Wikipedia
Intel Active Management Technology — (AMT) is hardware based technology for remotely managing and securing PCs out of band.] cite web |title=New Intel Based Laptops Advance All Facets of Notebook PCs|url=http://www.intel.com/pressroom/archive/releases/20080715comp… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Intelligence analysis — This article deals with the intellectual process of analysis itself, as opposed to intelligence analysis management, which, in turn, is a subcomponent of intelligence cycle management. For a complete hierarchical list of articles in this series,… … Wikipedia
SPARK (programming language) — infobox programming language name = SPARK influenced by = Ada, HAL/SSPARK is a formally defined computer programming language based on the Ada programming language, intended to be secure and to support the development of high integrity software… … Wikipedia
Skynet (Terminator) — Skynet is the main antagonist in the Terminator franchise an artificially intelligent system which became self aware and revolted against its creators. Skynet is rarely seen onscreen, and its actions are often performed via other robots, cyborgs… … Wikipedia