Search for: "In Re Atlantic Computer Systems" Results 21 - 40 of 162
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
You must pay them for the volunteer services if they’re performing any duties regularly performed by employees. [read post]
4 Oct 2018, 11:35 am by Anushka Limaye
We rely on contributions from our generous readers, and now, as a thank you, we're offering a Lawfare challenge coin! [read post]
20 Mar 2018, 1:16 pm by Andrew Keane Woods
[or] (2) Knowingly accesses and without permission takes, copies, or makes use of any data from a computer, computer system, or computer network, or takes or copies any supporting documentation, whether existing or residing internal or external to a computer, computer system, or computer network. [read post]
14 Oct 2018, 6:23 pm by Sabrina I. Pacifici
The technology as a whole largely suffers both from inaccuracy and systemic bias. [read post]
23 Jun 2021, 2:46 pm by Susan Landau
  The problems began in 1999, when the Post Office adopted a highly distributed computing system, Horizon IT. [read post]
23 Jun 2021, 2:46 pm by Susan Landau
  The problems began in 1999, when the Post Office adopted a highly distributed computing system, Horizon IT. [read post]
16 Jan 2010, 1:18 pm by Jean-François Legault
These terms might be contained in random text patterns such as those contained in remnants of deleted documents or binary system files found on the computer system. [read post]
6 Oct 2014, 4:45 am by David DePaolo
Figure out where you're going next so you can land that plane. [read post]
26 Sep 2008, 4:53 pm
"Despite the court's earlier favorable treatment of the Howells, in August the court determined that Jeffrey Howell had destroyed evidence by performing a KaZaA uninstall, a hard drive reformat, and a broader system wipe on his computer. [read post]
2 Jun 2010, 8:15 pm by Raffi Khatchadourian
Eyjafjallajökull had recently begun erupting, and he said, “We’re here to write about the volcano. [read post]
26 Dec 2018, 7:00 am by Susan Landau
This principle is one held essential by computer security experts. [read post]
3 Jun 2014, 10:06 am by Davidson Stephanie
PEG parsers are different from other types of parsers; they’re unambiguous. [read post]
3 Jun 2014, 10:06 am by Davidson Stephanie
PEG parsers are different from other types of parsers; they’re unambiguous. [read post]
21 Jul 2023, 4:54 am by Unknown
What you're purchasing is a computer file that’s value depends on whether someone else wants to buy it from you. [read post]
28 Jan 2020, 11:34 am by Danny O'Brien
Long before the personal computer revolution, the popular image of computing was wrapped tightly around their potential abuse as an invader of privacy—primarily, but by no means exclusively, led the state. [read post]
4 Jun 2021, 8:50 am by Eve Gaumond
Mark MacCarthy and Kenneth Propp have called the proposed regulation “a comprehensive and thoughtful start to the legislative process in Europe [that] might prove to be the basis for trans-Atlantic cooperation. [read post]
30 Sep 2010, 2:29 pm by Bexis
Ct. 1937 (2009), and Bell Atlantic Corp. v. [read post]
3 May 2015, 4:47 am by Ben
" The EFF said "After decades of increasingly draconian statutes and judicial decisions, our copyright system has veered far away from its original purpose. [read post]