Skip to main content
Search results
https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2023/06/generative-ai-raises-competition-concerns
Generative AI has the potential to rapidly transform the way we live, work, and interact...Generative AI has the potential to rapidly transform the ...
https://handbook.tts.gsa.gov/
Technology Transformation Services Handbook A resource for TTS employees The...The Technology Transformation Services Handbook is an open ...
https://www.afpc.af.mil/Career-Management/Fitness-Program/
...myFSS Fitness (Requires CAC or User/Password) DoDI 1308.03 DoD Physical Fitness/Body...build esprit May 28, 2024 Transform one, transform many ...
https://apps.dtic.mil/docs/citations/ADA464139
While we found that factors that made passwords inherently vulnerable did not transfer...ADA464139 Title: Beyond Passwords: Usage and Policy Transform ...
https://apps.dtic.mil/sti/citations/tr/ADA464139
While we found that factors that made passwords inherently vulnerable did not transfer...ADA464139 Title: Beyond Passwords: Usage and Policy Transform ...
https://handbook.tts.gsa.gov/general-information-and-resources/glossary/
...code in addition to a username and password. 2FA provides added security when...one kind of secret, but so are your passwords, service credentials ...
https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know
...probably undergone substantial transformation in the past two decades. As your...knowledge factor (for example, a password); a possession factor (for ...
https://apps.dtic.mil/sti/tr/pdf/ADA464139.pdf
While we found that factors that made passwords inherently vulnerable did not transfer...Beyond Passwords: Usage and Policy Transformation BEYOND PASS ...
https://www.ftc.gov/business-guidance/resources/start-security-guide-business
...information involved. Threats to data may transform over time, but the fundamentals of...access to data sensibly Require secure passwords and ...
https://www.sec.gov/newsroom/speeches-statements/crenshaw-statement-enhanced-cybersecurity-031523
...recognition of this fundamental transformation, and the importance of the electronic...information, such as change account passwords, put in place ...
https://www.retirees.af.mil/News/Article-Display/Article/3355057/air-reserve-component-retirement-pay-applications-transition-to-myfss/
...myFSS and MyVector. This Digital Transformation Initiative directly impacts how...Center. As a result of this digital transformation, the submission ...
https://www.dla.mil/Working-With-DLA/Applications/Details/Article/2923127/qpdqpl-qualified-products-database-or-qualified-products-list/
...in the QPD. As each QPL or QML is transformed to the QPD database, legacy QPLs...questions (registering, login, unlocking, password reset, etc.) ...
https://www.ihs.gov/rpms/applications/clinical/
Feedback Login Username Password Register Forgot Password Login WARNING! This warning...Description: This package is a transformation of Indian Health ...
https://www.nccih.nih.gov/training/videolectures/change-your-brain-transform-mind
Change Your Brain by Transforming Your Mind...Integrative Health Change Your Brain by Transforming Your Mind Lecturer: Richard J ...
https://www.nccih.nih.gov/training/videolectures/21/0
Biosketch for Change Your Brain by Transforming Your Mind...Biosketch for Change Your Brain by Transforming Your Mind Richard J. Davidson ...
https://digital.gov/2017/08/28/government-launches-login-gov-to-simplify-access-to-public-services/
...working with GSA’s Technology Transformation Service as the director of login...working with GSA’s Technology Transformation Service as the director ...
https://www.va.gov/oig/pubs/VAOIG-19-05960-244.pdf
...failed to encrypt or protect with passwords the discs that staff mailed to requesters...exception to the general encryption and password requirements ...
https://www.justice.gov/jmd/page/file/1398441/dl
...areas include cybersecurity, IT transformation, IT architecture and oversight...advances in cybersecurity, IT transformation, IT architecture and ...
https://iucrc.nsf.gov/centers/center-to-stream-healthcare-in-place-c2ship/
...development of new technologies, and transform health care delivery by enhancing...servers at the C2SHIP Center using a password protected Box data ...
https://apps.dtic.mil/sti/tr/pdf/ADA406544.pdf
...criteria for two different uses of passwords in an ADP system, 1 personal identity...and use of a password system in those systems where passwords are ...