Search for: "American Computer Company"
Results 1 - 20
of 5,165
Sorted by Relevance
|
Sort by Date
16 Jan 2015, 6:11 am
’American International Group, Inc. v. [read post]
27 May 2020, 4:15 am
A recent brazen and sophisticated computer intrusion into the records of over 145 million Americans launched from computer hackers based in China led to criminal prosecutions under the Computer Fraud and Abuse Act (CFAA). [read post]
10 Jan 2011, 3:01 am
The American technology firm iGate, backed by the private equity group Apax Partners, is to acquire a majority stake in the Indian information technology company Patni Computers in a $921 million deal. [read post]
18 May 2023, 10:48 am
College Park-based IonQ announced the availability of its IonQ Aria quantum computer on Amazon Braket, the quantum computing service of American Web Services. [read post]
19 Jul 2012, 3:13 pm
Computer companies account for nearly one-half of all new petitions for H1-B visas each year, according to a recent study. [read post]
11 May 2018, 1:25 pm
Great American Insurance Company. [read post]
25 Oct 2016, 1:18 pm
Apache was insured under a crime-protection insurance policy issued by Great American Insurance Company (“GAIC”). [read post]
10 Jun 2009, 3:06 pm
American Financial Services, Assoc., et al., found here, the plaintiff, Statescape, brought suit in the U.S. [read post]
24 Jan 2012, 12:54 pm
The New York Times' Julie Bosman (@juliebosman) reported yesterday that almost one in five Americans own a tablet computer. [read post]
26 May 2008, 3:00 am
I think that we all would know that a company owns its own computers and employees have no privacy rights on those computers. [read post]
31 Oct 2016, 7:27 am
Great American Insurance Company. [read post]
21 Sep 2018, 5:50 pm
Each year, Americans are seriously injured or killed because their computers overheat and they sustain burn injuries, or because technology injures them in some other way. [read post]
5 Jul 2011, 7:57 am
The deleted servers housed most of Shionogi's American computer infrastructure, including the company's e mail and Blackberry servers, its order tracking system, and its financial management software. [read post]
5 Jul 2011, 7:57 am
The deleted servers housed most of Shionogi's American computer infrastructure, including the company's e mail and Blackberry servers, its order tracking system, and its financial management software. [read post]
30 Oct 2014, 10:31 am
We continually warn about the use of work email accounts to correspond with your attorney: 3 tips for safe emailing with your attorney; Using a company computer to email your attorney may be a bad idea Emails from work computer can waive rights to privileged communications The American Bar Association has now opined that lawyers should […] [read post]
25 May 2010, 7:59 am
Some fear that the idea, which is in part a backlash against American companies like Google, will spread to other parts of the Continent, potentially undermining the promised benefits to Europeans of cloud computing, which is being billed as the biggest shift in computing since personal computers were introduced in the 1970s. [read post]
31 Jan 2015, 4:23 pm
The Third District emphasized that the computer `belong[ed] to the [company],’ that the company had a policy against using its computers for personal reasons, and that the employee was `aware of and agree[d] to these condition,’ going on to ex [read post]
13 Apr 2010, 6:33 am
In a world where every computer is connected, where it doesn't matter whether your e-mail is on the hard drive in your bedroom or a server half a world away, where your critical company documents can be viewed from anywhere, where would the Founding Fathers draw the line for law enforcement? [read post]
21 Oct 2013, 4:28 am
Ware developed software for ARSS that allowed employees to access the company's database using a web-based application. [read post]
8 Jan 2016, 5:26 am
The CFAA prohibits a number of different computer crimes, the majority of which involve accessing computers without authorization or in excess of authorization, and then taking specified forbidden actions, ranging from obtaining information to damaging a computer or computer data. [read post]