Search for: "Advanced Networking & Computers, Inc."
Results 161 - 180
of 426
Sort by Relevance
|
Sort by Date
24 Jul 2017, 11:36 am
… The report is an excellent snapshot of several distinct challenges the military use of computer network operations can pose. [read post]
6 Jun 2017, 12:53 am
Supreme Court’s reasoning in Quanta Computer, Inc. v. [read post]
5 Jun 2017, 8:30 am
” AlphaGo, designed by a team of researchers at Alphabet Inc. [read post]
15 May 2017, 10:17 am
Founded in the US in 2005, ChIPs is a nonpartisan, non-profit organization focused on advancing and connecting women in technology, law, and policy. [read post]
10 May 2017, 12:23 am
Those are matters for the a programmer or network engineer.Programs for computers are, in general, not considered technical. [read post]
1 May 2017, 7:08 am
Facebook, Inc., 2017 WL 1507491 (Cal. [read post]
21 Apr 2017, 1:39 pm
Uber Techs., Inc., 2017 U.S. [read post]
27 Mar 2017, 9:33 am
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
20 Mar 2017, 11:03 am
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
2 Jan 2017, 4:00 am
Each block is chained to the previous block and recorded across a peer-to-peer network, using cryptographic trust and assurance mechanisms. [read post]
26 Dec 2016, 4:30 am
Well Marie-Andree cited that 1879 case Feist Publications, Inc. v. [read post]
9 Dec 2016, 6:14 am
See Tor Metrics, The Tor Project, Inc., https://metrics.torproject.org/networksize.html. [read post]
28 Nov 2016, 7:10 am
Quicken Loans, Inc.). [read post]
10 Nov 2016, 4:00 am
This duty extends to all use of technology, including computers, portable devices, networks, technology outsourcing and cloud computing. [read post]
4 Nov 2016, 6:33 am
§ 948.075, entitled, `[u]se of a computer to facilitate a child sex crime,’ provid [read post]
27 Oct 2016, 8:48 am
The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on all… [read post]
21 Oct 2016, 6:53 am
Moreover, the [patent] does not require any components that could be considered an 'advance over conventional computer and network technology.'. . . [read post]
2 Oct 2016, 12:11 pm
See ‘610 patent, col. 1 ll. 59–61 (describing “screen[ing] computer data for viruses within a telephone network before communicating the computer data to an end user”). [read post]
26 Sep 2016, 8:19 am
Accusearch Inc., 570 F.3d 1187 (10th Cir. 2009). [read post]
26 Aug 2016, 6:21 am
She installed spyware on the computer, which recorded each website entered by the computer's users and captured screen shots every five minutes. [read post]