Search for: "Computer Programs and Systems, Inc." Results 261 - 280 of 1,495
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Jan 2020, 1:27 pm
Affirmed.Corporation (ʺUniversalʺ) developed and sold an automated assembly system to defendant‐counter‐plaintiff‐appellee Micro Systems Engineering, Inc. (ʺMSEIʺ) in 2007 pursuant to a purchase agreement. [read post]
29 Dec 2019, 7:23 pm
The capabilities of software programs like GoGuardian vary, but most can monitor the user’s browsing history, social media activity, and location, and some even log keystrokes. [read post]
20 Dec 2019, 8:49 am by Amy Howe
Continuing the tradition of a unanimous ruling for a first opinion, the decision in Henry Schein Inc. v. [read post]
18 Dec 2019, 10:03 am by Cynthia Marcotte Stamer
 Depending on the computer system used, DOJ claims Omnicare also sometimes assigned a fake number of authorized refills to a prescription – usually 99 allowable refills for Medicare patients – to allow for continuous refilling. [read post]
16 Dec 2019, 9:00 am by Law Offices of Salar Atrizadeh
Also, copyright laws do not protect the functional aspects of a computer program (e.g., algorithms, formatting, functions, logic, system designs). [read post]
  A Computer Violation was defined, in turn, to include both “the fraudulent:  (a) entry of Data into . . . a Computer System; [and] (b) change to Data elements or program logic of a Computer System, which is kept in machine readable format . . . directed against an Organization. [read post]
19 Nov 2019, 6:30 am by Rebecca Shafer, J.D.
Most claim management computer systems are programmed to kick out medical bills that occur before the date of injury. [read post]
29 Oct 2019, 3:05 am
November 7, 2019 - 1 PM: In re Gigit, Inc., Serial No. 87069673 [Refusal to register GIGIT for "staff augmentation services, namely, providing information technology (IT) support staff; updating and maintenance of data in computer databases" and for "computer and information technology security services, namely, providing social engineering assessments and assessing and testing the security posture and vulnerability of computer networks and the… [read post]
22 Oct 2019, 11:33 am by Daniel Schwartz
I’ll be speaking along with Doug Smith, Sr., Vice President Client Services at Tallan, Inc. [read post]
2 Oct 2019, 9:01 pm by Neil H. Buchanan
The development of mainframe computers allowed technically competent economists to develop outsized reputations—and, in some cases to make a great deal of money—by building large-scale computer programs that churned out projections from economic models that included hundreds of equations. [read post]
25 Sep 2019, 5:21 am by Patricia O'Keefe
  They could also point out that consumers watch content not only on their television sets now, but also on their cell phones, tablets and computers. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
The definition of malware, however, is actually broader and a bit of a misnomer, and actually means any program or file used by attackers to infiltrate a computer system. [read post]
22 Aug 2019, 6:38 am by Joy Waltemath
Concerned, he checked the computer system to see if the employee had completed his assignments. [read post]
20 Aug 2019, 9:01 am
The questions presented are: (1) whether copyright protection extends to a software interface; and (2) whether, as the jury found, the petitioner’s use of a software interface in the context of creating a new computer program constitutes fair use.See IPKat’s post herefor more insights of this case.PetitionThe most recent petitionthat still awaits a decision on whether to grant certiorari has been filed in a case between VHT Inc. and Zillow Group. [read post]
11 Aug 2019, 1:47 pm by Larry
If any one of those boards were imported by a computer manufacturer for use in assembling a computer, they might reasonably be classified as units or parts of an ADP system. [read post]
4 Aug 2019, 10:03 pm by Chris Castle
The abstract describes the findings: INTRODUCTION: Internet addiction disorder (IAD) is characterized by the problematic use of online video games, computer use, and mobile handheld devices. [read post]