Search for: "Computer Programs & Systems, Inc."
Results 181 - 200
of 1,493
Sorted by Relevance
|
Sort by Date
16 May 2014, 8:42 am
Removal of Malware: If a distributor puts a program on a computer that the consumer does not want, the consumer should be able to uninstall or disable it. [read post]
20 Oct 2014, 9:54 pm
Verifone, Inc., No. 2014-1135 (Fed. [read post]
15 Apr 2008, 1:00 am
"Let's say you've got your eye on a high-powered computer system. [read post]
4 Jan 2018, 9:58 am
And if a system of yoga poses isn’t copyrightable, then a system of APIs for operating a computer program definitely isn’t. [read post]
16 Feb 2022, 5:01 am
Whereas conventional computers consist of circuits that process data, quantum computers are more properly thought of as a collection of indeterminate data—qubits—that experience a program: at the end of the program’s execution, each qubit is measured. [read post]
25 Jul 2012, 9:44 pm
The decision is Novell, Inc. v. [read post]
26 Jul 2012, 9:35 pm
The decision is Novell, Inc. v. [read post]
29 Aug 2017, 1:24 pm
Though Medidata’s crime policy covered only “direct loss,” it defined “Computer Fraud” more broadly as “the unlawful taking or the fraudulently induced transfer” of money or other property “resulting from a Computer Violation,” including both fraudulent “entry of Data into . . . a Computer System” and “change to Data elements or program logic of a Computer… [read post]
9 Aug 2010, 8:31 pm
Golden Hour Data Systems, Inc. v. emsCharts, Inc., No. 2009-1306 (August 9, 2010)Golden Hour filed a patent application directed to computerized systems and methods for information management services in connection with emergency medical transport. [read post]
25 Mar 2016, 1:38 pm
-based computers involved the hacking into of the supervisory control and data acquisition (SCADA) system at the Bowman dam located about 30 miles north of New York City in Rye, New York. [read post]
15 Feb 2011, 7:23 am
Technologies, Inc. v. [read post]
9 Aug 2010, 8:26 pm
Nokia argued for a construction of “to find, identify, and instantiate the storage, input/output, and other peripheral devices of the computer system. [read post]
15 Feb 2012, 5:25 am
They involve the use of a computer and complex programming and are not drawn to purely mental processes. [read post]
25 Jun 2014, 11:03 am
Aereo’s system, the industry contended, was offering a very cheap version of TV programming to its customers while paying not a cent in royalties to the TV networks and their program developers. [read post]
28 Mar 2011, 12:46 pm
Defendant has admitted to using a keylogger program to obtain Plaintiff’s passwords. [read post]
3 Jun 2019, 8:46 am
These protective countermeasures should be part of the organization’s formalized information security program. [read post]
1 Jul 2013, 5:33 am
McAfee, Inc., 2013 WL 3200658 (N.D. [read post]
19 Aug 2009, 10:00 pm
Gonzalez had maintained stolen U.S. credit card information and computer hacking programs on a computer server in Latvia. [read post]
4 Aug 2011, 4:00 pm
[Post by Venkat Balasubramani] Pulte Homes, Inc. v. [read post]
31 May 2012, 7:50 am
Mylan Pharmaceuticals, Inc., Mylan, Inc. [read post]