Search for: "Computer Programs and Systems, Inc." Results 241 - 260 of 1,495
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Oct 2014, 4:30 am
  Essentially, the Bond covered “[l]oss resulting directly from a fraudulent . . . entry of Electronic Data or Computer Program into, or . . . change of Electronic Data or Computer Program within any Computer System operated by the insured, whether owned or leased”. [read post]
4 Nov 2009, 12:03 pm by Fernando M. Pinguelo
Philip Adams found himself in this precarious situation when he brought a patent infringement action against ASUSTEK Computer, Inc. and ASUS Computer International (collectively hereinafter "ASUS") alleging spoliation of relevant evidence. [read post]
18 Feb 2007, 10:00 pm
Dell call center slapped with overtime lawsuit Workers at a Dell Inc. call center sued in U.S. [read post]
29 Jan 2021, 9:49 am by Rachel Casper
In addition, the files will be stored on a secure stand‑alone computer system. [read post]
6 Apr 2014, 5:30 am by Barry Sookman
Sodrac 2003 Inc., 2014 FCA 84 -> How to return computers after Anton Pillar seizure 9219-1568 Quebec Inc. v. [read post]
21 May 2007, 4:46 am
" A quote from that Star story:The problem: Software designed by contractor Computer Associates International Inc. -- already paid more than $6 million by the state -- doesn't work. [read post]
10 May 2010, 7:03 am by Asbestos Litigation
In 1989, Dell Computer set up its first program on-site services to compensate for the lack of local retailers prepared to act as service centers. [read post]
1 Jul 2013, 5:30 am by Barry Sookman
Programs – National Association of Boards of Pharmacy® (NABP®) http://t.co/FzOxyK4Ait -> Guardly Launches Mobile Mass Notifications With Indoor Positioning To Help With Emergency Response http://t.co/kWHIPBaqZ1 -> 3 Reasons Why America's Security Model is Broken http://t.co/6YTYi2knNg -> Facebook removing ads from controversial Pages http://t.co/lKdDFHFTro -> Amazo [read post]
5 Dec 2017, 12:01 pm by ligitsec
Accessing the System 6 In order to copy MP3 files through the Napster system, a user must first access Napster’s Internet site and download1 the MusicShare software to his individual computer. [read post]
8 Apr 2010, 11:46 am by Betsy McKenzie
• Developing systems for crowd-sourced corrections to book data and metadata. [read post]
28 May 2014, 12:15 pm by Ralph D. Clifford
For this second area, it helps that I am trained in computer science and spent several decades programming for a variety of businesses. [read post]
15 Apr 2021, 12:19 pm by Rachel Casper
The betting money is that computer passwords first showed up at the Massachusetts Institute of Technology in the mid-1960s in order to track time when using a mainframe computer: The Compatible Time-Sharing System (CTSS). [read post]