Search for: "Computer Programs & Systems, Inc." Results 181 - 200 of 1,493
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 May 2014, 8:42 am by Caroline Klocko
Removal of Malware: If a distributor puts a program on a computer that the consumer does not want, the consumer should be able to uninstall or disable it. [read post]
15 Apr 2008, 1:00 am
"Let's say you've got your eye on a high-powered computer system. [read post]
4 Jan 2018, 9:58 am by Vera Ranieri
And if a system of yoga poses isn’t copyrightable, then a system of APIs for operating a computer program definitely isn’t. [read post]
16 Feb 2022, 5:01 am by Chris Jay Hoofnagle, Simson Garfinkel
Whereas conventional computers consist of circuits that process data, quantum computers are more properly thought of as a collection of indeterminate data—qubits—that experience a program: at the end of the program’s execution, each qubit is measured. [read post]
29 Aug 2017, 1:24 pm by Inside Privacy
Though Medidata’s crime policy covered only “direct loss,” it defined “Computer Fraud” more broadly as “the unlawful taking or the fraudulently induced transfer” of money or other property “resulting from a Computer Violation,” including both fraudulent “entry of Data into . . . a Computer System” and “change to Data elements or program logic of a Computer… [read post]
9 Aug 2010, 8:31 pm by Two-Seventy-One Patent Blog
Golden Hour Data Systems, Inc. v. emsCharts, Inc., No. 2009-1306 (August 9, 2010)Golden Hour filed a patent application directed to computerized systems and methods for information management services in connection with emergency medical transport. [read post]
25 Mar 2016, 1:38 pm by John Jascob
-based computers involved the hacking into of the supervisory control and data acquisition (SCADA) system at the Bowman dam located about 30 miles north of New York City in Rye, New York. [read post]
9 Aug 2010, 8:26 pm by Eric Schweibenz
  Nokia argued for a construction of “to find, identify, and instantiate the storage, input/output, and other peripheral devices of the computer system. [read post]
25 Jun 2014, 11:03 am by Lyle Denniston
  Aereo’s system, the industry contended, was offering a very cheap version of TV programming to its customers while paying not a cent in royalties to the TV networks and their program developers. [read post]
28 Mar 2011, 12:46 pm by Cyber Lawyer
Defendant has admitted to using a keylogger program to obtain Plaintiff’s passwords. [read post]
19 Aug 2009, 10:00 pm
Gonzalez had maintained stolen U.S. credit card information and computer hacking programs on a computer server in Latvia. [read post]