Search for: "Computer Programs and Systems, Inc."
Results 341 - 360
of 1,495
Sort by Relevance
|
Sort by Date
16 Apr 2018, 2:00 am
A general purpose computer can be programmed to execute code and software.The examiner also addressed the applicant's argument that the claims were directed to an improvement in computer technology:[T]he invention as claimed is not drawn to an improved encryption engine for a computer system that improves efficiency. . . . [read post]
16 Apr 2018, 2:00 am
A general purpose computer can be programmed to execute code and software.The examiner also addressed the applicant's argument that the claims were directed to an improvement in computer technology:[T]he invention as claimed is not drawn to an improved encryption engine for a computer system that improves efficiency. . . . [read post]
5 Apr 2018, 7:55 pm
RADACK ROBOSIGNER REDUX: Chief of one of many courts of appeal in Texas takes swipe at 2017 CFPB enforcement action against Transworld Systems, Inc. [read post]
2 Apr 2018, 4:03 pm
Without the CEO’s day-to-day leadership and focus, the board has no place to start and any cybersecurity program will likely fail. [read post]
30 Mar 2018, 9:06 am
(Oracle America, Inc. v. [read post]
13 Mar 2018, 11:19 am
Sales Suppression Software Commonly called “zappers,” sales suppression software programs run on a point-of-sale computer or cash register and are used to secretly delete some or all of a restaurant’s cash transactions and then reconcile the books of the business. [read post]
18 Feb 2018, 4:22 am
The FDA reviewed and authorized for marketing the Banyan Brain Trauma Indicator in fewer than 6 months as part of its Breakthrough Devices Program. [read post]
5 Feb 2018, 2:44 pm
Active Network, Inc., 790 F.3d 1343 (Fed. [read post]
2 Feb 2018, 8:57 am
MAPFRE informed OCR that it was able to identify the breached ePHI by reconstituting the data on the computer on which the USB data storage device was attached. [read post]
2 Feb 2018, 4:31 am
Blue Coat Systems, Inc. [read post]
24 Jan 2018, 9:22 am
The CDAFA provides that any person who “[k]nowingly accesses and without authorization takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network” is liable under the statute. [read post]
18 Jan 2018, 7:41 am
In 2007, the fee system was expanded to include internet-enabled computers, which drew massive protests from the public and media alike. [read post]
10 Jan 2018, 6:07 am
A printout of “machine or machine-independent (object or source) language which will cause a computer to perform a desired procedure or task such as solve a problem, regulate the flow of work in a computer, or control or monitor events” may also be electronically submitted as a “Computer Program Listing. [read post]
7 Jan 2018, 8:15 pm
Amazon.com, Inc. [read post]
4 Jan 2018, 9:58 am
And if a system of yoga poses isn’t copyrightable, then a system of APIs for operating a computer program definitely isn’t. [read post]
12 Dec 2017, 4:36 pm
The company, Munched, Inc. halted its ICO after being contacted by the SEC, and agreed to an order in which the Commission found that its conduct constituted unregistered securities offers and sales. [read post]
5 Dec 2017, 12:01 pm
Accessing the System 6 In order to copy MP3 files through the Napster system, a user must first access Napster’s Internet site and download1 the MusicShare software to his individual computer. [read post]
1 Dec 2017, 2:55 pm
Interestingly, the Commission announced the Cyber Unit just five days after disclosing a hack of its own EDGAR filing system in September, which allowed access to nonpublic information and facilitated improper gains.[22] Although the SEC’s enforcement program has lost some of its vigor, it has certainly not ground to a halt. [read post]
30 Nov 2017, 4:26 am
Prometheus Labs., Inc., 132 S. [read post]
29 Nov 2017, 4:23 pm
Interestingly, the Commission announced the Cyber Unit just five days after disclosing a hack of its own EDGAR filing system in September, which allowed access to nonpublic information and facilitated improper gains.[22] Although the SEC’s enforcement program has lost some of its vigor, it has certainly not ground to a halt. [read post]