Примеры использования Intelligence data на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Latest intelligence data you learn here.
Download 250 detailed technical specs& competitive intelligence data for OMME Mini 10.5 E.
Can intelligence data be utilized in criminal investigations?
Organization of the gathering of intelligence data at entry and exit control points;
This intelligence data comes from DIS sources and the Costa Rican office of Interpol.
This squad is also trained to collect intelligence data to help the assault squad.
The Asset Intelligence data collection cycle has not yet inventoried the server.
Are there any impediments to utilizing the intelligence data in criminal investigations?
The intelligence data is collected and sorted by computers, and transmitted on-line to Washington.
Download 250 detailed technical specs& competitive intelligence data for Platform Basket TR 15.80.
More opaque are the agreements between intelligence agencies to share databases and intelligence data.
To what extent can intelligence data be used in judicial proceedings?
ISMW conference brought together the experts in the field of social media and social network analysis,artificial intelligence, data mining, big data. .
Intelligence data, if reliable and collected with the authorization and under the supervision of the judge, can be used in the court.
The Coordination Centre analyses criminal intelligence data and will enhance the sharing of law enforcement intelligence in the region.
When a Systems Management Server2003SP3 site with the Asset Intelligence feature already installed and enabled is upgraded to Configuration Manager2007,Asset Intelligence data collection will remain enabled.
The DCSNet real-time intelligence data intercept has the capability to record, review and playback intercepted material in real-time.
Seventh, an agreement on legal cooperation for the exchange of evidence, intelligence data and drug traffickers in international prisons.
Group-IB's intelligence data is transmitted in STIX/TAXII format according to standards of cyber threat information exchange developed by OASIS.
Before configuring hardware inventory, software inventory,file collection, or Asset Intelligence data collection, consider your privacy requirements.
Before configuring Asset Intelligence data collection and deciding whether or not to submit information to System Center Online, consider your privacy requirements.
Similarly, when a Configuration Manager 2007 site with the Asset Intelligence feature already installed and enabled is upgraded to Configuration Manager 2007SP1,Asset Intelligence data collection will remain enabled.
Asset Intelligence Data Collection is not enabled by default on new installations, but if it was previously enabled for a SMS 2003 SP3, then it is still enabled after upgrade.
Powell and his team began work at 0400 each day to digest radio intercepts and other intelligence data(such as estimating how many tanks Rommel currently had and what his likely plans were) ready to present to the chiefs of staff at 0900.
When a Systems Management Server2003SP3 site with the Asset Intelligence feature already installed and enabled is upgraded to Configuration Manager 2007,Asset Intelligence data collection will remain enabled.
Development and implementation of underground automated intelligence data system for calculation of space-time parameters of rock deformation process in the zone of second mining influence at"Gluboky" mine of OAO"PPGKhO.
Similarly, if a Configuration Manager 2007 site with the Asset Intelligence feature already enabled is upgraded to Configuration Manager 2007SP1,Asset Intelligence data collection will remain enabled.
This effort includes gathering,processing and analysing intelligence data(human and technical) about terrorism; using special forces when necessary; the physical protection of potential terrorist targets; and the strategic analysis and forecasting of emerging threats.
States should develop cooperation projects closely linked to relevant areas of the private sector, upgrade and intensify communication between law enforcement agenciesat the regional level, and strengthen the opportunities for the interchange of intelligence data.
This effort includes gathering,processing and analysing intelligence data(human and technical) about terrorism; using special forces when necessary; the physical protection of potential terrorist targets; and the strategic analysis and forecasting of emerging threats.