Search for: "Metadata Systems Software" Results 221 - 240 of 532
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 May 2016, 2:11 pm by Rebecca Tushnet
  Not so much about software—use of tech is almost always mixed w/human [read post]
22 Apr 2016, 12:18 pm
 Last week a federal jury in Wisconsin awarded Epic Systems, a medical software company, $940 million in damages as a result of a trade secret lawsuit it brought against Tata Consultancy Services in 2014 . [read post]
19 Apr 2016, 4:04 pm by Parker Higgins
Speaking to a representative who floated the idea of a key escrow system, University of Pennsylvania Associate Professor of Computer and Information Science Dr. [read post]
19 Apr 2016, 11:44 am by Savannah Wiseman (US)
System Restrictions – Computer systems should be designed to restrict system rights and access to the appropriate, authorized personnel only. [read post]
18 Apr 2016, 6:19 am by Paul Rosenzweig
By driving actors away from American products and systems we might have the perverse effect of driving internet traffic and technology companies offshore, depriving our analysts of valuable metadata information. [read post]
15 Apr 2016, 7:10 am by Jon Gelman
Metadata Ethics Opinions Around the U.S.Source: aba.orgConfidentiality is a crucial element in workers' compensation matters and the removal of metadata in electronically transmitted documents are a critcal factor in the process of maintaining the level of security embraced by the system. [read post]
29 Mar 2016, 6:41 pm by Cory Doctorow
The free software movement has given us many of the Internet's core technologies: the GNU/Linux operating system, the Apache web-server, NGINX, OpenSSL encryption,  and much, much more. [read post]
24 Mar 2016, 5:32 am
Dec. 30, 2014) (“sophisticated new techniques, including metadata filtering, predictive coding, and other forms of technology-assisted review, are immensely advantageous . [read post]
2 Mar 2016, 4:26 pm by Kevin LaCroix
  Because iPhone 5c’s (and all later models) can only run software with Apple’s proprietary cryptographic signature, the FBI wants Apple to create and upload a custom version of iOS to Farook’s device that overrides this mechanism. [read post]
2 Mar 2016, 4:00 am by David Whelan
We often look at the systems that lawyers use to improve client service and productivity. [read post]
4 Jan 2016, 5:30 am by Andrew Goodwin
A provider’s cloud technology may involve a complex interplay between systems and network appliances, proprietary technology, licensed third-party software and open source software. [read post]
21 Dec 2015, 9:29 am
Three years later, Mashcat is a loose group of metadata specialists, cataloguers, developers and anyone else with an interest in how metadata in and around libraries can be created, manipulated, used and re-used by computers and software. [read post]
19 Nov 2015, 8:35 am by Orin Kerr
First, the Third Circuit adopted a functional approach to the distinction between content and metadata. [read post]
7 Nov 2015, 5:47 am by Elina Saxena
Herb Lin wrote on large-scale geoengineering, “attempts to modify the planetary system in such a way as to mitigate the effects of global warming,”  and the potential threat that it poses to national security. [read post]
5 Nov 2015, 12:15 pm by Elina Saxena, Cody M. Poplin
” In other cyber related news, the Daily Beast writes that Pentagon contractors hired Russian programmers to “write computer software for sensitive U.S. military communications systems, setting in motion a four-year federal investigation that ended this week with a multimillion-dollar fine against two firms involved in the work. [read post]
30 Oct 2015, 5:00 am by Nicholas Weaver
  Even if the content is unknown, the metadata is the message. [read post]
13 Oct 2015, 12:37 pm by Jeremy Malcolm
There are cases where it could be useful to have a system that allows the optional signing and encryption of JPEG metadata. [read post]
26 Sep 2015, 7:22 am by Rebecca Tushnet
   Protectability: Early cases: AV works can be fixed in software. [read post]
11 Sep 2015, 6:04 am
KATAKIS also installed and used and caused others to use a software program that overwrote deleted electronic records and documents so that they could not be viewed or recovered. [read post]