Search for: "Target Corporation Store Design" Results 301 - 320 of 592
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Jan 2017, 8:15 am by Lawrence B. Ebert
was incorporated on January 29, 1929, with the corporation having trademark rights in "seeing eye. [read post]
22 Dec 2016, 8:45 am by Andrew Keane Woods
  One can read this ruling as implicitly stating a preference for private (corporate) data retention policies over those mandated by a national government. [read post]
15 Dec 2016, 8:36 am by Steven Boutwell
Extortion: Ransomware is a type of malware designed to block off access to data stored in a computer system until money is paid (typically in bitcoin) to the hacker. [read post]
14 Dec 2016, 8:22 am by Matt Maurer
Might specialty stores or dispensaries be the exclusive retailer of marijuana? [read post]
7 Sep 2016, 7:22 am by Graham Smith
  Thus BI is described at 7.1 as a 'capability designed to obtain foreign-focused intelligence'. [read post]
7 Sep 2016, 7:22 am by Graham Smith
  Thus BI is described at 7.1 as a 'capability designed to obtain foreign-focused intelligence'. [read post]
7 Sep 2016, 7:22 am by Graham Smith
  Thus BI is described at 7.1 as a 'capability designed to obtain foreign-focused intelligence'. [read post]
29 Aug 2016, 1:19 pm by Michael Grossman
Both drugs are manufactured by Janssen Pharmaceutical, a subsidiary of the parent corporation Johnson & Johnson. [read post]
29 Aug 2016, 7:04 am by Rebecca Tushnet
Aug. 26, 2016)Hallatt buys Trader Joe’s-branded goods in Washington state, transports them to Canada, and resells them there in Pirate Joe’s, a store he designed to mimic a Trader Joe’s store. [read post]
28 Jul 2016, 2:30 pm by Cynthia Marcotte Stamer
  Its designated health care component, UMMC, includes University Hospital, the site of the breach in this case, located on the main UMMC campus in Jackson. [read post]
14 Jul 2016, 12:18 pm by Jeffrey Neuburger
 The Act was originally designed to target hackers, but has lately been brought to bear in many contexts involving wrongful access of company networks by current and former employees and in cases involving the unauthorized scraping of data from publicly available websites. [read post]
29 Jun 2016, 6:13 am by Barry Sookman
Geist claims that the ruling “could alter the innovation balance…by targeting a disruptive technology that everyone agrees has both legitimate and infringing uses. [read post]
16 Jun 2016, 2:48 pm by Kevin LaCroix
  Strong corporate leaders, like those who populate the c-suite at Morgan Stanley, seek answers from independent and neutral sources of information. [read post]
24 May 2016, 4:52 pm by David Kopel
Henigan had left a corporate law partnership to join HCI and pursue his vision of social reform. [read post]
19 May 2016, 7:45 am
In doing so, they regularly cited nondisclosure agreements they had signed with the Harris Corporation, maker of the Stingray, and with the FBI, prohibiting them from telling anyone (including other government outfits) about how — or even that — they use the devices. [read post]
25 Apr 2016, 8:00 pm by Will R. Daugherty
Data loss prevention software is designed to prevent users from sending sensitive data outside the corporate network without authorization. [read post]
17 Apr 2016, 9:28 pm by Kim Kirschenbaum
NRC confirmed that only one plant exists without the design flaw. [read post]
13 Apr 2016, 4:55 pm by Kevin LaCroix
It is not a mere coincidence that law firms increasingly are targeted in data breach attacks. [read post]