Search for: "Automation, Control and Information Systems Corporation" Results 361 - 380 of 486
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
27 Jun 2014, 12:02 pm by Joseph Ashbrook
The Sixth Circuit’s recent decision in Automated Solutions Corporation v. [read post]
7 Jun 2014, 11:18 am by Nicholas Wooldridge
For example: In the Federal Archives system, usually a minimum of two visits is required. [read post]
2 Jun 2014, 12:56 am by Sanjana
Noting that current conflict transformation models largely looked at conflict through a liberal democratic lens, or some form of an inclusive, participatory, discursive model of systemic transformation, the corporate ownership of content could mean that in the future, shareholders of key companies would have more power and control over public domain information than any government or transnational authority like the UN. [read post]
2 Jun 2014, 12:56 am by Sanjana
Noting that current conflict transformation models largely looked at conflict through a liberal democratic lens, or some form of an inclusive, participatory, discursive model of systemic transformation, the corporate ownership of content could mean that in the future, shareholders of key companies would have more power and control over public domain information than any government or transnational authority like the UN. [read post]
12 May 2014, 4:18 am by David DePaolo
Some capacitors in the 35 year old servo that controls the left aileron decided to check out. [read post]
We’re also wary of engaging in a negotiation in Capitol Hill on this topic, since too often powerful corporate interests will trump the best interests of everyday users in the lawmaking process. [read post]
22 Apr 2014, 12:28 pm by Jason Krause
We won’t bore you with the complete list, but you can read more in “A Brief History of the 20 Critical Security Controls” The Technology Network security starts with Network Intrusion Detection Systems (IDS) which, as you might guess, are automated systems to detect and prevent network intrusions. [read post]
3 Apr 2014, 11:36 pm by Andrew Langille
The average age of new apprentices in Nova Scotia is approximately twenty-eight, the current system of training is under-resourced, and currently the apprenticeship system is in a state of upheaval. [read post]
25 Mar 2014, 7:33 pm
On the corporate side, we’ve seen the rise and evolution of legal process outsourcing (from India and the Philippines to stateside), document review companies, e-discovery vendors, automated contracts reviewers, and a host of really remarkable new technologies for getting legal work done. [read post]
23 Feb 2014, 9:08 am by Monique Altheim
    IoT (Internet of Things)    Over 500,000 Belkin WeMo Home Automation Devices Vulnerable to Hackers’ Attacks. [read post]
27 Jan 2014, 8:48 pm by Angelo A. Paparelli
First, the American legal system is deliberately adversarial. [read post]
27 Jan 2014, 8:48 pm by Angelo A. Paparelli
First, the American legal system is deliberately adversarial. [read post]
27 Jan 2014, 5:48 pm by Angelo A. Paparelli
First, the American legal system is deliberately adversarial. [read post]
14 Jan 2014, 9:48 am by Jay Yurkiw
One of the key issues in these cases is whether the employer has “possession, custody, or control” over the devices. [read post]
20 Nov 2013, 6:56 am by kirschenfeld
Law librarians and legal research instructors can explain the advantages of controlled vocabularies like the Topic and Key Number System®, of annotated statutes, and of citators. [read post]
20 Nov 2013, 6:56 am by kirschenfeld
Law librarians and legal research instructors can explain the advantages of controlled vocabularies like the Topic and Key Number System®, of annotated statutes, and of citators. [read post]
4 Nov 2013, 9:46 am by Jane Chong
 In 2012, a researcher found almost two dozen vulnerabilities in industrial control systems (ICS) software used in power plants, airports and manufacturing facilities. [read post]
29 Oct 2013, 9:30 pm by Pooja Agarwal
    While restricting the ability to use automated dialing systems to place calls to mobile phones may seem to target only a small group, a Centers for Disease Control survey conducted in 2012 showed that upwards of 38% of households have only wireless phones with no landlines. [read post]
18 Sep 2013, 10:44 am by Jonathan Bailey
However, sites such as Domain Tools can automate the process of querying those individual databases and can provide public information. [read post]
12 Sep 2013, 1:57 pm by Raffaela Wakeman
 NSA suspended the automated system that furnished correlation results to metadata analysts, and ended the practice of treating correlations as RAS-approved across the board. [read post]