Search for: "Intelligent Computer Solutions, Inc." Results 121 - 140 of 215
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Sep 2015, 7:32 am
The proffered definition of "index" as a reference table having keys that allow one to address data items was specific to computers. [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
   By taking steps to insure that information flow about data breaches within the industry and the latest intelligence about rising threats are considered by management on an ongoing basis, companies can stay current on the latest threats and prepare accordingly – preparedness is the key. [read post]
23 Jul 2015, 6:00 am by Administrator
The legal challenge posed by search engines, however, stems from the fact that they run on artificial intelligence (AI). [read post]
8 Jul 2015, 9:10 am
Watson, Currently From Wikipedia: "Watson is an artificially intelligent computer system capable of answering questions posed in natural language". [read post]
16 Apr 2015, 6:00 am by Administrator
Gamification strategies have been used in businesses with differing levels of sophistication for issues including customer relationship management, training, market research, business intelligence, and education. [read post]
8 Dec 2014, 12:01 pm by Wells Bennett
The company’s website says that it’s “a global leader in Actionable Intelligence solutions for customer engagement optimization, security intelligence, and fraud, risk and compliance,” with clients in “more than 10,000 organizations in over 180 countries. [read post]
16 Oct 2014, 6:00 am by Yosie Saint-Cyr
He wanted the package to use his Blackberry and computer during an upcoming vacation to China. [read post]
3 Jul 2014, 4:13 am by Kevin LaCroix
  Insureds who conduct such countermeasures may themselves be in violation of the Computer Fraud and Abuse Act or other state and federal regulations. [read post]
Another company, Turnstyle Solutions Inc., has placed sensors around Toronto that surreptitiously record signals emitted by WiFi-enabled devices and can track users' movements. [read post]
4 Nov 2013, 9:46 am by Jane Chong
The fact that a single vulnerability can give rise to untold numbers of compromised computers and harms that are difficult to cabin makes dumping costs entirely on end users unreasonable as a policy matter. [read post]
9 Apr 2013, 7:37 am by Kristen Eichensehr
  The event featured keynote addresses by former Secretary of Homeland Security Michael Chertoff, now Senior Of Counsel with Covington and founder of The Chertoff Group, and Representative Mike Rogers (R-MI), Chairman of the House Permanent Select Committee on Intelligence (“HPSCI”) and principal sponsor of the Cyber Intelligence Sharing and Protection Act (“CISPA”), which passed the House last year and is expected to be re-introduced and voted upon in… [read post]
28 Jan 2013, 2:38 pm by Paralegal Mentor
I am a Senior Corporate and Securities Paralegal working in the Silicon Valley for Infoblox Inc., a tech company based in Santa Clara, California, that provides Automated Network Control solutions, and that became a publicly traded company in early 2012 (NYSE: BLOX).I have been in the legal profession for nearly 25 years, having served in the Corporate Legal departments of several leading public companies such as Starbucks Coffee Company, Expedia.com, Infospace.com, Clearwire… [read post]
31 Oct 2012, 5:05 am by Rob Robinson
Vendor Part I  - http://bit.ly/RBypzy (Michael Fluhr) Managing the Risks of Bring Your Own Device (BYOD) – http://bit.ly/RmsyNs (Chris Marzetti) Pitting Computers Against Humans in Document Review – http://bit.ly/W4KDaf (Steve Green, Mark Yacano) Predictive Coding in Unpredictable Order from US Chancery Judge – http://bit.ly/PWWLHQ (David Sharpe) Predictive Coding Metrics are for Weenies – Part I – http://bit.ly/Q1FZas (Karl Schieneman) Rolling the… [read post]