Identifying and locating lost or stolen personal digital...
Identifying and recommending potential communication states...
Identifying and suppressing transient routing updates
Identifying and using identities deemed to be known to a user
Identifying and using identities deemed to be known to a user
Identifying associated systems such as advertising networks
Identifying critical network and application entities
Identifying dynamic groups
Identifying dynamic groups
Identifying interfaces related to a service
Identifying interfaces related to a service
Identifying IP addresses for spammers
Identifying link failures in a network
Identifying modular chassis composition by using network...
Identifying network management policies
Identifying nodes in a ring network
Identifying object suppliers in a network
Identifying relevant data from unstructured feeds
Identifying unauthorized communication systems using a...
Identifying unauthorized communication systems using a...