Search for: "Authentic Designs" Results 2001 - 2020 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Mar 2020, 11:23 am by Lori J. Sommerfield
Multi-factor authentication can present barriers to access to data for consumers, so migrating to API will be a necessary evolution. [read post]
16 Apr 2024, 10:35 am by Catherine Reach
Pricing has two tiers, one at $200 a month that supports authenticated access with up to 100 users per site per month. [read post]
10 Apr 2008, 12:12 pm
Suggs makes no argument that the documents are not authentic. [read post]
9 Jul 2023, 8:59 am by David Yamada
However, buoyed by exchanges with his young servant, Gerasim, Ivan eventually starts to ask deeper questions about whether he has led a good and authentic life. [read post]
30 May 2024, 7:32 am by Dan Cooper and Laura Somaini
The Garante, although not designated as a competent authority for AI, maintains its competence and powers in relation to the processing of personal data. [read post]
16 Nov 2010, 1:22 pm by WIMS
    Interestingly, neither the EPA release, nor the Proclamation mention the fact that as recently as this fall two major competing electronic waste recycling programs, operated by Institute of Scrap Recycling Industries (R2) and the Basal Action Network (e-Stewards), have announced major developments in their programs designed to prove their validity, independence and authentication [See WIMS 9/28/10]. [read post]
2 Apr 2024, 4:53 am by Rob Robinson
Embodying these four pillars, ComplexDiscovery OÜ presents distinct programs designed to leverage them effectively. [read post]
28 Feb 2013, 9:55 am by Rebecca Tushnet
Anyway, this case was different: It is akin to the consumer asking for a Coca–Cola and receiving a tray with unopened, labeled, authentic cans of Pepsi–Cola, RC Cola, Blue Sky Cola, Dr. [read post]
25 May 2023, 5:16 am by Annie I. Antón, Olivia C. Mauger
That act requires the National Institute of Standards and Technology (NIST) director to use a severity-based metric to designate vulnerabilities found in open-source software and employ digital signatures to indicate whether NIST-released software is authentic. [read post]
17 Mar 2020, 6:30 am by JB
Non-transparent government speechOver the years, the United States Congress has passed various bills and appropriations riders that are designed to prevent federal official from engaging in "propaganda. [read post]
7 Nov 2014, 12:56 pm by Rebecca Tushnet
  Branding as authenticating source—old strict source theory of TM law has been replaced by anonymous source rule. [read post]
31 Mar 2020, 9:07 am by Dustin Lewis, Naz Modirzadeh
Security Council resolutions for the purpose of designing targeted technical assistance and capacity building efforts[.] [read post]
7 Apr 2015, 2:42 pm by JB
The Fourteenth Amendment was designed to enforce equality before the law and ban class legislation. [read post]
29 Jun 2020, 4:33 pm by Katitza Rodriguez
South Korea used to require websites with more than 100,000 visitors per day to authenticate their identities by entering their resident ID numbers when they use portals or other sites. [read post]
16 Jul 2013, 1:25 pm
  (g) Patents, trade-marks, utility models and designs shall be deemed to be situated at the place where the trade, business or profession to which it pertains is carried on. [read post]
15 Oct 2016, 6:47 pm
Eighth, only the judiciary (either generally or through specialized tribunals designated therefore), may interpret and apply authoritatively as against other institutions of states and non-state actors. [read post]
1 Feb 2010, 4:25 am
(IP Dragon)   Europe ECJ: Big surprise in Lego trade mark dispute: AG refers to logical business expectations: Lego Juris A/S v OHIM and MEGA Brands, Inc (IPKat) ECJ referral from EWCA on manufacturing fiction: Nokia v HMRC (EPLAW) Functional designs at OHIM again (Class 99) European Court of First Instance design appeals (Class 99) Blogging ACTA across the globe: FFII’s Ante Wessels on exporting Europe’s flaws (Electronic Frontier Foundation) Are you aware of… [read post]
31 Jan 2019, 12:03 am by Nicholas Moline
Rackspace offers a more traditional email service which is designed to work with either a webmail application or a desktop email client such as Thunderbird, Apple Mail or Outlook. [read post]