Search for: "Root User" Results 261 - 280 of 1,901
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Jun 2007, 12:33 pm
Imagine the fun if a virus circulated that changed the square root of 1, or decided that pi equals 2. [read post]
21 Sep 2015, 1:55 pm by Bill Budington
In the future, we hope to see more users protected by CT and its adoption across the web. [read post]
1 Dec 2017, 11:45 am
Discrimination in the virtual world is no less damaging than offline discrimination, but it can be even more difficult to root out. [read post]
30 Dec 2023, 7:58 am by Jason Kelley
Third, the law endangers the privacy of all Utah users, as it requires many sites to collect and analyze private information, like government issued identification, for every user, to verify ages. [read post]
25 Feb 2015, 5:05 pm by Jeremy Gillula and Joseph Bonneau
Like Komodia’s software, PrivDog installs a root certificate when it’s installed, which it then uses to sign the certificates it intercepts. [read post]
10 Dec 2019, 3:19 pm by Andrew Crocker
Facebook’s director for messaging privacy Jay Sullivan discussed ways that the company will root out abuse on its platforms while removing its own ability to read users’ messages. [read post]
22 Apr 2016, 3:33 am by INFORRM
Both claims are rooted in rights that the ECHR has traditionally balanced carefully against free expression, so part of the answer may lie in that case law. [read post]
4 Nov 2013, 9:46 am by Jane Chong
” But here’s the real punch line: Drug users and software users are about equally likely to recover damages for whatever harms those wares cause them. [read post]
16 Apr 2019, 8:39 pm by Danny O'Brien
At the time of his arrest, he was putting down roots in his new home, including co-founding Centro de Autonomia Digital, a non-profit devoted to creating user-friendly security tools, based out of Ecuador’s capital, Quito. [read post]
7 May 2014, 4:04 pm by Meena Harris
”Much of the support for a use system is rooted in its advantages of shifting responsibility from individuals to the entities that collect, maintain, and use data, while also holding data users accountable for how they manage data and any harms caused, rather than narrowly defining their responsibility as whether consent is properly obtained at the time of collection. [read post]
24 Mar 2016, 7:00 am by Docket Navigator
[C]laims 1 and 6 are directed to 'alleviating congestion in a communication network' and recite steps used to perform the method for a flow of data to and from end user devices connected to a network through communication devices. [read post]
16 Apr 2019, 8:39 pm by Danny O'Brien
At the time of his arrest, he was putting down roots in his new home, including co-founding Centro de Autonomia Digital, a non-profit devoted to creating user-friendly security tools, based out of Ecuador’s capital, Quito. [read post]
2 Feb 2011, 8:37 am by Kevin Smith
  The need to prove actual damage is just one of several ways in which the Jamaican law roots copyright protection in unfair business practices, which is, in my opinion, where it rightfully belongs. [read post]
17 Sep 2024, 6:45 am by Evangelina Cantu
  Given limitations of the data and the potential for errors, it is uncertain whether users may make inaccurate assumptions or conclusions. [read post]
15 May 2017, 2:32 am by Romano Beitsma
The invention addresses the known view utilisation problem: given a user query written over base tables, as well as a collection of materialised views, which materialised views can be used to answer the query (description, page 2, first paragraph)? [read post]
25 Jul 2015, 4:34 pm by INFORRM
Their stated motive is said to be rooted in morality but blackmail may be a better word. [read post]
27 Jan 2010, 7:25 pm by Jim Harper
And I’ll be working to make sure that the good practices that take root in the earmark area branch out to other areas as well. [read post]
4 Feb 2011, 1:16 am by Fernando M. Pinguelo
  Thus, a basic way to secure your cloud is to make sure the hardware itself is secure – in other words, to create “hardware root of trust. [read post]
27 Jul 2017, 10:22 am by Dan Goodin
Root status allowed the apps to bypass security protections built into the mobile operating system. [read post]