Search for: "Authentic Designs" Results 1981 - 2000 of 2,935
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 May 2014, 6:19 pm by Michael Froomkin
If we each have only one identity capable of transacting, and if our access to communications resources, such as ISPs and email, requires payment – or even just authentication – then all too quickly everything we do online is at risk of being joined to our dossier. [read post]
30 May 2014, 5:00 am
  As the district court explained, “[T]he court may consider a document attached to [the motion] without converting the motion into one for summary judgment if the attached document is (1) central to the plaintiff’s claim and (2) undisputed,” which means “the authenticity of the document is not challenged. [read post]
27 May 2014, 4:00 am by Linda K. Robertson
We are all at our best when we bring our authentic selves to work. [read post]
20 May 2014, 5:24 pm by Gene Quinn & Steve Brachmann
Procter & Gamble has developed a cleaning solution designed to meet tough standards in the field of sanitation developed by the European Union. [read post]
20 May 2014, 2:12 pm by Alexander Major
” The part is deemed “counterfeit” when found to be an unlawful or unauthorized reproduction, substitution, or alteration that has been knowingly mismarked, misidentified, or otherwise misrepresented to be an authentic, unmodified electronic part from the original manufacturer, or a source with the express written authority of the original manufacturer or current design activity, including an authorized aftermarket manufacturer. [read post]
20 May 2014, 12:16 pm by Dennis Crouch
The least specific and least secret level of information is Altavion’s general idea for a barcode allowing for self-authentication of documents with identification of alterations. [read post]
14 May 2014, 2:03 pm by Christine Nielsen Czuprynski
Using Risk-Based Approach: Covered contractors have some flexibility in designing their counterfeit electronic part detection and avoidance systems, and are not required to follow a “one size fits all” approach. [read post]
6 May 2014, 4:26 pm by BakerHostetler
Cybersecurity encompasses risks such as thefts of funds or business information and attacks designed to disable a firm’s operations. [read post]
29 Apr 2014, 6:00 am by Duets Guest Blogger
And, the most authentic representation of the Chipotle brand in William Espy’s speech on how they are changing the economics of better food sourced from better origins. [read post]
25 Apr 2014, 4:46 am
 The renewal fees are likely to be somewhat higher than the amount that is paid for four designations, but not significantly higher. [read post]
24 Apr 2014, 2:42 pm by Lindsay Griffiths
The customer is enormously empowered to ignore ads, and organic marketing is just more authentic. [read post]
23 Apr 2014, 6:12 am by Matthew L.M. Fletcher
Defendant’s conduct is designed to convey to consumers a false association or affiliation with the Quileute Tribe, and to unfairly trade off of the fame, reputation and goodwill of the Quileute Tribe. 4. [read post]
18 Apr 2014, 4:16 pm by Alexander Major
On April 10, 2014, the FTC and the Department of Justice issued a joint policy statement clarifying that the sharing of properly designed cyber threat information will likely not raise antitrust concerns. [read post]
18 Apr 2014, 4:37 am by Benjamin Wittes
The authenticity of the documents in question is not disputed. [read post]
17 Apr 2014, 12:19 pm by Jim Walker
It's what I call a "puff-piece" by a travel writer, extolling the quiet "authentic island charm" and the "warm and friendly" people. [read post]
15 Apr 2014, 6:51 am by Arvind Narayanan
For example, my colleague Joseph Bonneau has argued that authentication is becoming a machine learning problem. [read post]
Government must respect the right of human beings to make self-defining decisions and to live their lives authentically in light of those choices. [read post]
9 Apr 2014, 3:54 pm by Sabrina I. Pacifici
“EFF has long advocated for websites to support HTTPS instead of plain HTTP to encrypt and authenticate data transmitted on the Internet. [read post]