Search for: "Metadata Systems Software" Results 241 - 260 of 532
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Aug 2015, 8:32 am by Glyn Moody
This explains the eagerness of the BfV to obtain the NSA's XKeyscore software after German agents had seen its powerful metadata analysis capabilities in demonstrations. [read post]
6 Aug 2015, 10:21 am by Jared Correia
Perhaps, as a solo litigator, you have to have extensive metadata tools. [read post]
6 Aug 2015, 7:34 am by Jared Correia
Perhaps, as a solo litigator, you have to have extensive metadata tools. [read post]
30 Jul 2015, 10:08 am by Bruce Schneier
(Sure, some of these will have flaws, and they'll be identifiable by their metadata, but the FBI already has the metadata, and the better software will rise to the top.) [read post]
28 Jul 2015, 11:28 am
The newest list of these technologies introduces the risk of overbreadth by setting an extremely low bar for what forms of encryption classify under this regime—regulating not only encryption software itself, but the systems, electronics and encryption used to implement, develop, produce and test it. [read post]
28 Jul 2015, 10:57 am by Tara Hofbauer
” Stateside, the detainees would be held in “supermax cells” and prosecuted by the military justice system. [read post]
6 Jul 2015, 2:30 pm by Bruce Schneier
Use reasonably strong encryption software on a reasonably secure device. [read post]
29 May 2015, 2:29 pm by Susan Landau
This would change the system from government retention of bulk communications metadata to company retention. [read post]
29 May 2015, 12:16 pm by Michael Payne
  This process strips the metadata that would be found in the original electronic version and violates the rules governing the production of ESI. [read post]
29 May 2015, 7:13 am by Rebecca Tushnet
  Metadata can be used accurately to estimate glucose. [read post]
28 May 2015, 11:04 am by Tara Hofbauer
According to Reuters, the plan will likely force Chinese government agencies to buy technological software from domestic purveyors. [read post]
28 May 2015, 4:00 am by Ken Chasse
For example, the Windows 3.1 operating system has close to 3 million lines of software code. [read post]
13 May 2015, 9:11 pm by Kevin LaCroix
The customer is generally responsible for maintaining the operating systems and software necessary to run the applications, plus the data placed in the cloud environment. [read post]
26 Apr 2015, 4:30 am by Barry Sookman
NLRB http://t.co/QPoSUDZbnR -> Chris Roberts denied flight after tweeting about hacking onboard systems http://t.co/6M7d2dlRA5 -> 'Safe harbour' court ruling could prevent US firms from reaching European users http://t.co/hLRFsOETBw -> Universities in NZ hit by increase in copyright licences http://t.co/x8PO048FM9 -> blogged: Computer and Internet Law Updates for 2015-04-19 http://t.co/r8xIOCpVFV -> Computer and Internet Law Updates for 2015-04-19: Music and movie… [read post]
24 Feb 2015, 2:43 pm by Nate Russell
Enter a new tool from another homegrown Vancouver outfit, PageFreezer Software. [read post]
16 Feb 2015, 9:30 am by Wells Bennett
For example, by exploiting vulnerabilities already present on the target’s phone—and every large software system has vulnerabilities—it is possible to eavesdrop. [read post]
13 Feb 2015, 4:40 am by Benjamin Wittes
This “metadata” does not include the contents of telephone conversations. [read post]
5 Feb 2015, 11:30 am by Benjamin Wittes
” In the long list of problems, they outline “the lack of software versioning, reliance on VPN, the errors in the installation and deployment documentation, leaking of document metadata, and lack of anonymity best practices all contribute to our reluctance for suggesting that DeadDrop is ready for mass deployment. [read post]
3 Feb 2015, 7:29 am by Wells Bennett
SECTION 215 Bulk Telephony Metadata Program In his remarks on January 17, 2014, the President ordered a transition that would end Section 215 bulk metadata program as it currently exists. [read post]
6 Jan 2015, 10:00 pm by Doug Austin
FEE DISPUTES Are providers of services related to eDiscovery abusing the system? [read post]