Search for: "Root User" Results 281 - 300 of 1,699
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
At the root of all of this, however, is that the secret trade negotiation process is a vehicle for multinational corporations to lobby for provisions that will impact how users interact, share, and develop technological tools and content — without any opportunity for those users to know about, much less comment on, those provisions. [read post]
22 Jun 2020, 4:47 pm by rainey Reitman
Exceptions to Apple’s policies don’t fix the root problems, which is a broken marketplace that is financially incentivized to limit user choices and competition. [read post]
13 Aug 2008, 7:44 pm
"You have to follow the chain of signatures down from the root to the top-level domain to the user's domain. [read post]
9 Oct 2013, 4:24 am by Ed Felten
Setting the user ID to zero is a problem because user ID number zero is the “rootuser, which is allowed to do absolutely anything it wants—to access all data, change the behavior of all code, and to compromise entirely the security of all parts of the system. [read post]
25 Oct 2018, 10:00 am by Corynne McSherry
But, at root, the Internet still represents and embodies an extraordinary idea: that anyone with a computing device can connect with the world, anonymously or not, to tell their story, organize, educate and learn. [read post]
17 Oct 2012, 9:45 pm by Tim Banks @TM_Banks
 However, it is complicated by the fact that the application of privacy principles tend to discourage the most obvious tool to identify children – asking the user for his or her age. [read post]
28 Feb 2019, 11:53 am by Cannabis Law Group
In reality, nearly two-thirds of California cities expressly bar marijuana businesses from establishing roots. [read post]
7 Jun 2021, 12:02 pm by Overhauser Law Offices, LLC
Title 1 D0920,483 Faucet spout 2 D0920,443 Playhouse 3 D0920,363 Display screen with a graphical user interface 4 D0920,362 Display screen with a graphical user interface 5 D0920,350 Display screen with animated graphical user interface 6 D0920,349 Display screen with a graphical user interface 7 D0920,248 Vehicle alternator drive 8 D0920,019 Display stand 9 D0919,997 Chair back 10 11018610 Motor drive system and method 11 11017899 Pairing and… [read post]
22 Feb 2010, 11:54 am by Steve Schultze
Are there viable user interface improvements? [read post]
18 Aug 2015, 11:22 pm by Dan Goodin
The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine. [read post]
18 May 2012, 10:58 am by Kim Zetter
ZTE has vowed to fix the security hole. “ZTE is actively working on a security patch and expects to send the update over-the-air to affected users in the very near future,” ZTE told Reuters. “We strongly urge affected users to download and install the patch as soon as it is rolled out to their devices.” [read post]
9 Jun 2008, 10:52 am
EWeek's Larry Seltzer cites several examples of recent exploits, which embed malicious software in PDF documents, and which install root kits on unsuspecting systems. [read post]
8 Jan 2015, 10:20 am by Danny O'Brien and Nadia Kayyali
But, as we discuss below, there are ways to craft effective responses, rooted in the core ideals upon which the Internet was built, to protect the targets of harassment and their rights. [read post]
4 Feb 2011, 1:58 pm by Geoffrey Manne
As others have noted, the basic concept of neutrality in search is, at root, farcical. [read post]
15 Aug 2012, 9:47 am by Jon
That is the meaning that term might have for some of its critics, but is generally not the meaning it has for its proponents, which has its roots in law Latin:Ex tota materia emergat resolutio. [read post]
9 Oct 2009, 4:47 pm by Deborah Schander
I'll be very interested to see if this idea actually does take root, be it in the UK or elsewhere. [read post]
18 Nov 2015, 11:53 am by Andres
From the preposterous idea that you can hack into an alien computer, to increasingly unbelievable graphic user interfaces, film has been poisoning our perception of computing for years (and don’t get me started on CSI:Cyber). [read post]
27 Dec 2007, 2:34 pm
It was a year of soul searching at THREAT LEVEL, every day a fresh challenge to our fundamental beliefs and convictions: Alberto Gonzales made us pine for John Ashcroft; Google made us love roving surveillance cams; and Jammie Thomas' internet spoofing defense was enough to make us secretly root for the RIAA. [read post]
30 Oct 2014, 6:27 pm by Yana Welinder
  The quality control requirement in trademark law is rooted in the notion that a trademark represents the source of a good. [read post]