Search for: "We Do Web Content" Results 2101 - 2120 of 6,023
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Feb 2007, 9:07 am
But I do know the basics of how to hack my iPod to play clips that I find on the web. [read post]
19 Oct 2005, 4:30 am
" For instance, I've tried to include in each post a reference to the section of the Bankruptcy Code which the case analyzes; so if you're looking for all posts which discuss the amendments to 11 U.S.C. 522 you could do a search for "522" and get a listing of the posts referring to the statute.Hope this helps, and we look forward to hearing from you. [read post]
19 Oct 2005, 4:30 am
" For instance, I've tried to include in each post a reference to the section of the Bankruptcy Code which the case analyzes; so if you're looking for all posts which discuss the amendments to 11 U.S.C. 522 you could do a search for "522" and get a listing of the posts referring to the statute.Hope this helps, and we look forward to hearing from you. [read post]
16 Jul 2010, 1:51 pm by Andrew McDiarmid
This is clearly how people use broadband - as a general-purpose connection to their own choice of unaffiliated web content and services - and it is high time for the FCC to recognize this. [read post]
1 May 2019, 1:31 pm by Nicholas Moline and Luis Franco
In order to do this, when someone taps on your snippet in the Google Search Results from their phone, instead of loading the copy directly from your web server, they instead load this pre-processed copy from Google’s AMP Cache. [read post]
27 Jan 2014, 6:00 am by Jonathan Bailey
While it’s tempting to dismiss Gaoom as just another spam site, it’s different from the mass plagiarism and Web spam we’ve been confronted with in the past. [read post]
29 Oct 2020, 3:31 pm by Elliot Harmon
When volunteer moderators take action in small web discussion forums—they’re protected by Section 230. [read post]
1 May 2022, 1:04 am by Joshua Richman
But now when you think about everything we do in a day, there's a computer involved in almost all of that. [read post]
20 Apr 2007, 2:29 pm
There was not quite so much on non-web applications such as content management systems or library catalogues (a.ka. [read post]
13 Sep 2017, 1:07 pm by jeremy
As a result, “keystrokes, text message content and other very sensitive information [was] in fact being transmitted from some phones on which Carrier IQ is installed to third parties. [read post]
28 May 2021, 12:21 pm by Marina Wilson
We recommend 2-4 contextual links per page, but this may vary depending on the content of your site. [read post]
27 May 2015, 9:16 am by Rebecca Tushnet
Software tools owners currently used to locate content on the web will quickly locate allegedly infringing content. [read post]
25 Apr 2008, 1:30 pm
  What knowledge do you collect? [read post]
25 Jun 2010, 9:37 am by JB
Thus, if we want more innovation in Web services-- which will ultimately benefit end users--we should construe section 512 strictly as the district court does.Viacom might reply that the decision is not pro-innovation at all: if Google is held harmless, it will have no incentive to innovate to come up with new methods of identifying infringing content. [read post]
7 Dec 2014, 9:00 pm
[…] We conclude that the limitations of the ’545 claims do not transform the abstract idea that they recite into patent-eligible subject matter because the claims simply instruct the practitioner to implement the abstract idea with routine, conventional activity. [read post]
26 Mar 2017, 9:24 pm by Jeremy Gillula and Peter Eckersley
Simply put, if Internet providers think they can profit from looking at your encrypted data and start deploying these systems widely, we’ll no longer be able to trust the security of our web browsing—and that could end up exposing everything from your email to your banking information to hackers. [read post]