Search for: "Computer Programs and Systems, Inc." Results 321 - 340 of 1,495
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Apr 2011, 3:45 pm
's Messenger computer program has logic configured to do each of the three things called for by claim 45. [read post]
8 Jul 2016, 9:43 am by Fraud Fighters
The companies resell hardware products such as computers and printers, and provide IT consulting services related to systems management, IT security, and data backup and recovery. [read post]
22 Jul 2012, 9:51 am
The top occupations were programmer/analyst (72,000+), project manager, computer programmer, systems analyst, software engineer, senior system engineer, consultants and managers, and lead engineers. [read post]
22 Jul 2012, 9:51 am
The top occupations were programmer/analyst (72,000+), project manager, computer programmer, systems analyst, software engineer, senior system engineer, consultants and managers, and lead engineers. [read post]
4 Sep 2012, 10:39 am by Ron Coleman
In case that was a serious question in your mind, the Second Circuit Court of Appeals answered it last week: In September 2010, ivi, Inc. began live streaming WPIX’s copyrighted programming over the internet to paying subscribers who downloaded ivi’s TV player onto their computers. [read post]
2 Feb 2016, 12:46 pm by Lawrence B. Ebert
As is described in the specification,computer programs may anomalously “terminatedue to any number of threats, program errors, softwarefaults, attacks, or any other suitable software failure. [read post]
18 Aug 2009, 4:42 am by brandond
The system, for use by computer software developers, removes dependency on document encoding technology. [read post]
11 Dec 2013, 6:30 am by Rebecca Shafer, J.D.
Stack, CPA, Principal, Amaxx Risk Solutions, Inc. is an expert in employer communication systems and part of the Amaxx team helping companies reduce their workers compensation costs by 20% to 50%. [read post]
24 Oct 2018, 4:33 pm by Kevin LaCroix
  2005–2016: The SEC Outsider Trading Program  Consider this scenario: A Microsoft employee sneaks into Microsoft’s CFO’s office, reads secret files about an upcoming positive earnings announcement and then buys Microsoft stock before that announcement. [read post]
27 Jul 2021, 8:00 am by Ram Eachambadi | JURIST Staff
Among other things, the independent expert is required to possess a Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA) credential, have at least five years of experience evaluating the effectiveness of computer systems or information system security, and be well-versed with the Australian Privacy Act. [read post]
15 Jun 2021, 5:13 am by Dennis Crouch
  IBI’s mark registration generally covers computer software for database management and decision support systems. [read post]
13 Jan 2014, 1:52 pm by assoulineberlowe
Aereo, Inc., Docket 13-461) The Court will decide whether a company “publicly performs” a copyrighted television program when it retransmits a broadcast of that program to thousands of paid subscribers over the Internet. [read post]
30 Mar 2020, 11:38 am by Rebecca Tushnet
Malwarebytes Inc., No. 5:18-cv-05409-EJD, 2020 WL 1478345 (N.D. [read post]