Search for: "Advanced Networking & Computers, Inc." Results 161 - 180 of 426
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Jul 2017, 11:36 am by Robert Chesney
… The report is an excellent snapshot of several distinct challenges the military use of computer network operations can pose. [read post]
15 May 2017, 10:17 am
 Founded in the US in 2005, ChIPs is a nonpartisan, non-profit organization focused on advancing and connecting women in technology, law, and policy. [read post]
10 May 2017, 12:23 am by Sander van Rijnswou
Those are matters for the a programmer or network engineer.Programs for computers are, in general, not considered technical. [read post]
27 Mar 2017, 9:33 am by Jordan Brunner
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
20 Mar 2017, 11:03 am by Jordan Brunner
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
2 Jan 2017, 4:00 am by Monica Goyle
Each block is chained to the previous block and recorded across a peer-to-peer network, using cryptographic trust and assurance mechanisms. [read post]
26 Dec 2016, 4:30 am by Ben
Well Marie-Andree cited that 1879 case  Feist Publications, Inc. v. [read post]
9 Dec 2016, 6:14 am
 See Tor Metrics, The Tor Project, Inc., https://metrics.torproject.org/networksize.html. [read post]
10 Nov 2016, 4:00 am by Administrator
This duty extends to all use of technology, including computers, portable devices, networks, technology outsourcing and cloud computing. [read post]
4 Nov 2016, 6:33 am
§ 948.075, entitled, `[u]se of a computer to facilitate a child sex crime,’ provid [read post]
27 Oct 2016, 8:48 am by Cynthia Marcotte Stamer
  The requirements of the Corrective Action Plan both seek to address the specific weaknesses that lead to the breaches of unsecured ePHI reported by OHSU in its breach notifications as well as the broader deficiencies in OHSU’s overall HIPAA compliance practice by requiring among other things that OHSU: Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI at all OHSU facilities and on all… [read post]
21 Oct 2016, 6:53 am by Docket Navigator
Moreover, the [patent] does not require any components that could be considered an 'advance over conventional computer and network technology.'. . . [read post]
2 Oct 2016, 12:11 pm by Dennis Crouch
See ‘610 patent, col. 1 ll. 59–61 (describing “screen[ing] computer data for viruses within a telephone network before communicating the computer data to an end user”). [read post]
26 Sep 2016, 8:19 am by Rebecca Tushnet
Accusearch Inc., 570 F.3d 1187 (10th Cir. 2009). [read post]
26 Aug 2016, 6:21 am
She installed spyware on the computer, which recorded each website entered by the computer's users and captured screen shots every five minutes. [read post]