Search for: "Automation, Control and Information Systems Corporation" Results 241 - 260 of 484
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Sep 2019, 8:50 pm by Kevin LaCroix
Chris is a professor in the Department of Computer Information Science at Minnesota State University, Mankato where he regularly teaches Information Security and Information Warfare classes. [read post]
27 Jul 2020, 4:32 pm by Cory Doctorow
Filters often mistake users own creative works for copyrighted works controlled by large corporations and block them at the source. [read post]
22 May 2011, 4:03 am
These were:(a) The Digicash ecash system; (b) The Open Market Technical White Paper OM-TransactTM: Technical Overview; (c) The Dr Dobbs Journal on-line article entitled ‘Implementing a Web-Shopping Cart’; (d) Telstra’s prior Australian patent application no 19173/97 (which concerned an automated telephone connection system); and, (e) A patent in the name of Hitachi.The Hearing Officer considered each in turn (at [64] to [73]). [read post]
19 Mar 2013, 12:14 pm by Graham Smith
  It was not in a position comparable to that of an author, an editor or the corporate proprietor of a newspaper. [read post]
  It proposes introducing a fee regime similar to the UK’s Freedom of Information Act (FOIA) fee regime. [read post]
3 Feb 2011, 1:59 am
Teena Massingill, Safeway's director of corporate public affairs, also said the chain has sometimes "used Club Card data to make automated or personal telephone calls to customers regarding recalled products. [read post]
8 Jan 2020, 8:06 am by Kevin LaCroix
For instance, ransomware gangs now use more sophisticated modus operandi, by illegally gaining access to networks, and over time, slowly taking command by installing backdoors, stealing the credentials of administrative accounts, and ultimately gaining control over domain controllers; and Ransomware attacks have become more automated, requiring less attacker interaction. [read post]
8 Jan 2020, 8:06 am by Kevin LaCroix
For instance, ransomware gangs now use more sophisticated modus operandi, by illegally gaining access to networks, and over time, slowly taking command by installing backdoors, stealing the credentials of administrative accounts, and ultimately gaining control over domain controllers; and Ransomware attacks have become more automated, requiring less attacker interaction. [read post]
23 Jul 2018, 4:44 pm by Camille Fischer
Innovation Recent Supreme Court rulings have provided some balance to a patent system that many thought had gotten out of control. [read post]
14 Oct 2019, 9:55 am
  This was echoed by Zeng Zhihua, Director General in Automation Department and Patent Examination Cooperation Guang Dong Center, CNIPA. [read post]
30 Nov 2006, 10:20 am
., Sept. 13/PRNewswire/ — Lighthouse Global Technologies is pleased to present E-Trail Digital Archive Lite, a feature-rich version of its electronic communication retention, retrieval, and supervision system that is affordable for small companies seeking better control over their electronic communications. [read post]
7 Nov 2023, 9:05 pm by renholding
We should know that an automated system is being used, and the explanations should be readable, accessible, and updated. [read post]
16 Oct 2020, 4:12 pm by Katitza Rodriguez
Now the company behind any AR system could have a live audio/visual window into all corners of the world, with the ability to locate and identify anyone at any time, especially if facial or other recognition technologies are included in the package. [read post]
17 Feb 2015, 4:17 am by Kevin LaCroix
This destructive cyber-attack was a game-changer for corporate America because it became clear that hackers are not simply focused on credit card numbers or personal information. [read post]
29 Oct 2012, 10:56 am by Carolyn Elefant
  We must, sometimes take matters into our own hands and develop our own platforms and solutions instead of using others and paying the terrible price of loss of control or integrity or worst of all, our clients’ confidential information. [read post]
14 Jan 2024, 9:05 pm by Cary Coglianese
” Added to the extreme variation in uses and designs of algorithms is the fact that, for many uses, multiple different algorithms are used in combination with each other to support automated systems. [read post]
18 Dec 2012, 12:39 pm by Hopkins
When the user empties the recycle bin, the data comprising the document is still there on the disk, but it looks different to the system. [read post]
8 Apr 2019, 2:16 pm by Kevin LaCroix
Chris is a professor in the Department of Computer Information Science at Minnesota State University, Mankato where he regularly teaches Information Security and Information Warfare classes. [read post]
4 Apr 2022, 6:44 pm by Sabrina I. Pacifici
” This has obvious ramifications for corporate office space, employee well-being, and even climate change. [read post]