Search for: "Authentic Designs" Results 2601 - 2620 of 2,935
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Jun 2010, 3:31 pm by lawmrh
Or it was a designation circumspectly stored up for soldiers like WW II Medal of Honor recipient Audie L. [read post]
25 Jun 2010, 6:28 am by John Gregory
The UECA was designed for these rules to be informal, so long as they are communicated to the people who need to know about them. [read post]
24 Jun 2010, 4:36 am by Rebecca Tushnet
Panel 1: Reuse, Recycle, Rethink: The Impact of Google Book Search Panelists: Peter Jaszi (Moderator), American U. [read post]
22 Jun 2010, 6:27 pm by legalinformatics
Here are the legal-informatics topics, from the topics about which papers are invited: Challenges to e-Government: Interoperability; Language issues; Identity Management – including Authentication, Trust and Privacy; Semantics of transactions in e-Government, definitions and implementations e-Voting e-Democracy: ICT and the case of deliberative democracy; Using Blogs and Wikis to enhance participation; Citizen trust in online participation and dialogue; The design of… [read post]
22 Jun 2010, 3:40 pm by Rebecca Tushnet
Nature of the work: photos are generally considered creative; paintings, sculpture, and architectural designs always are. [read post]
19 Jun 2010, 3:09 am by Andres
Any image selected to be part of the Flickr Collection on Getty Images that had been in Creative Commons will automatically be designated for Royalty-Free licensing. [read post]
17 Jun 2010, 4:30 am by Thomas Baker
  My abbreviated take away from the book — provided merely to whet your appetite — is that the best college teachers center their courses -- from course design to student evaluation -- on the student and dedicate themselves to facilitating the student’s learning. [read post]
13 Jun 2010, 4:10 pm by tjsllibrary
As defendants and victims, African-Americans on trial for their lives in Southern courts became the central figures in the design and redesign of capital punishment in the twentieth century. [read post]
13 Jun 2010, 2:22 pm by ALeonard
  The filmmakers have based the staging on photographs of the original, re-creating the backdrops and costumes designed by Nicholas Roerich, so there is that touch of authenticity, but only towards the end of the ballet does the disruption in the audience come anywhere near what historical accounts insist happened on that evening in Paris in 1913. [read post]
13 Jun 2010, 6:03 am by Brian Scott
If you obtain your registration before or within five years of your plush toy's creation, registration will provide prima facie (authentic) evidence in court. [read post]
5 Jun 2010, 11:01 am by Oliver G. Randl
A printed document of value having at least one authenticity feature in the form of a luminescent substance based on a host lattice doped with at least one rare earth metal which absorbs and is excitable substantially in the visible region of the spectrum and is transparent in at least parts of the IR spectral region, whereby the rare earth metal is holmium and the luminescent substance is present in the volume of the document of value in a concentration such that the desired properties… [read post]
4 Jun 2010, 11:27 am by Venkat
Although this case was designated non-published and therefore isn't binding on the 9th Circuit, this case nevertheless illustrates that most of these plaintiffs' lawyers are wasting their time and significant social resources with their poorly developed cases. [read post]
3 Jun 2010, 12:53 pm by emp
Assuming one-factor authentication (two-factor authentication, using a token, being preferable) changing passwords frequently and “rate limiting” are probably the most effective means to deter password cracking. [read post]
1 Jun 2010, 6:23 pm by Ashwin Sharma
Ultra-violet technology and tactile clues allow accurate card authentication at border crossings. [read post]
1 Jun 2010, 1:28 pm by Kim Zetter
Or is it a clever smear by US intelligence, designed to discredit the Union, fracture Somali alliances and manipulate China? [read post]
25 May 2010, 2:19 pm by cap95
Legislative: The online version of the Ohio Revised Code, published by Lawriter, lacks a designation as official, but so does the printed version of the Code. [read post]
24 May 2010, 4:55 pm by J. Alex Halderman
Because of these dangers, remote administration software should be designed defensively, minimizing the risk even if the authentication fails. [read post]
24 May 2010, 4:58 am
"  Authentic but nonetheless wrong in its zeal to oversimplify. [read post]
21 May 2010, 1:30 pm by Ryan Singel
It’s designed to prevent eavesdroppers from analyzing the URL or content to see the search terms you are sending to Google, or the results. [read post]
20 May 2010, 2:09 pm by Kim Zetter
The primary issue in the Lower Merion case is the optional Theft Track feature in the software designed to let administrators covertly snap images through the computers’ webcams. [read post]