Search for: "Metadata Systems Software" Results 181 - 200 of 532
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Dec 2017, 11:40 am by Gritsforbreakfast
They can't simply look to the text of the fourth amendment and see something that gets you to metadata from your cell phone. [read post]
20 Dec 2017, 11:09 am by Kevin LaCroix
For example, using software to travel through a network to inventory software for licensing purposes is considered processing of personal data (application [read post]
7 Dec 2017, 6:00 am by Nicholas Weaver
Furthermore, the SWIFT data was stolen from a Texas-based analyst’s system, not from someone in Maryland. [read post]
1 Dec 2017, 11:35 am by Overhauser Law Offices, LLC
Title 1 D804,033 Blood testing apparatus 2 D803,996 Lavatory basin 3 9,831,624 Plug assemblies 4 9,830,673 System portal control for a diabetes management system 5 9,830,424 Bed/room/patient association systems and methods 6 9,830,090 Metadata caches in a reliable distributed computing system 7 9,829,517 Service switch with high current arc protection 8 9,829,482 Motility-contrast imaging for oocyte and embryo viability assessment 9 9,829,401 Strain… [read post]
20 Oct 2017, 4:00 am by Ivan Mokanov
Links are the backbone of (legal) information systems In research information systems we use citation information heavily. [read post]
19 Oct 2017, 11:16 am by Ron Friedmann
Consider making D/A part of a bigger system: One firm has a series of complex steps that includes a SQL database, formal workflows, and ties to document management system. [read post]
19 Oct 2017, 6:31 am by Ron Friedmann
Consider making D/A part of a bigger system: One firm has a series of complex steps that includes a SQL database, formal workflows, and ties to document management system. [read post]
17 Oct 2017, 4:30 am by Daniel Byman
Using link-analysis software, metadata and greater information gathering, the government would know not only suspected right-wing terrorists, but also their friends, family members and other parts of their network. [read post]
5 Oct 2017, 10:30 am by Robyn Greene
Public reporting shows that in 2016 the NSA and CIA conducted well over 35,000 queries of content and metadata for U.S. person’s communications. [read post]
31 Jul 2017, 6:19 am by admin
For states that will continue relying on the software and/or services of a partner, these guidelines can help define an RFP and inform negotiations and contracting. [read post]
24 Jul 2017, 8:18 am by Guest Author for TradeSecretsLaw.com
Time Stomping Software tools exist that let users change the dates associated with documents. [read post]
12 Jul 2017, 9:20 am by cory
It's true that EME goes further than other DRM systems in making space available for the addition of metadata that helps people with disabilities use video. [read post]
27 Jun 2017, 6:06 pm by Sabrina I. Pacifici
Metadata for research data discovery and management, Lizz Jennings, Research Data Librarian (Systems), University of Bath. [read post]
21 Jun 2017, 6:17 am by Michael Geist
However, these limitations do not apply in all circumstances, including activities involving acquiring or analyzing publicly available data or cybersecurity, software, and systems testing. [read post]
15 Jun 2017, 7:52 am by Andres
This case follows a CJEU decision on multimedia players containing pre-loaded streaming software for infringing purposes (Stichting Brein v Wullems C‑527/15). [read post]
15 Jun 2017, 7:52 am by Andres
This case follows a CJEU decision on multimedia players containing pre-loaded streaming software for infringing purposes (Stichting Brein v Wullems C‑527/15). [read post]
13 Jun 2017, 9:25 am by Ron Friedmann
As a Fireman & Company partner, I have worked with several leading providers of experience management systems, including Prosperoware, Neudesic Firm Directory, and Foundation Software Group. [read post]
22 May 2017, 4:00 am by Dillon Reisman
  Courts frequently use simplistic mental models for complex systems out of necessity. [read post]
” In the first of these updates, the government told the FISC that “human error was the primary factor in these incidents,” but also explained that system designs were to blame as well. [read post]
26 Mar 2017, 9:24 pm by Jeremy Gillula and Peter Eckersley
But given that software like Carrier IQ could record what websites you visit and what search terms you enter, it would be pretty tempting for Internet providers to resurrect that spyware and use it for advertising purposes. [read post]