Search for: "United States v. 22 DEVICES, ETC." Results 21 - 40 of 70
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Apr 2018, 6:00 am by Hayley Evans
Five protocols—Protocol I (Non-detectable fragments); Amended Protocol II (Mines, booby-traps, other devices); Protocol III (Incendiary weapons); Protocol IV (Blinding laser weapons); and Protocol V (Explosive remnants of war)—are currently annexed to the CCW. [read post]
2 Mar 2018, 9:11 am by Guest Blogger
Stanley Fish This brief essay was delivered as a response to a paper co-written by Justice Thomas R. [read post]
2 Mar 2018, 9:11 am by Guest Blogger
Stanley Fish This brief essay was delivered as a response to a paper co-written by Justice Thomas R. [read post]
18 Feb 2018, 7:45 pm by Barry Sookman
 It is, therefore, of great consequence and concern that the California court summarily decided that the order made against Google could not be enforced in the United States. [read post]
9 Nov 2017, 3:44 pm
Intermediaries (lawyers, accountants, etc.) are likely to be the greatest beneficiaries of these rules. [read post]
4 Jun 2017, 7:51 pm
The apex of this European flirtation with robust SOE driven economies occurred through the 1970s[22] with substantially different approaches to “socialism” and state management of economic activities across democratic Europe, in contradistinction to the central planning economies of the Soviet Union with a negligible private sector.[23] By the end of the 1990s that system was in the advanced stages of dismantling. [read post]
24 Mar 2017, 9:10 am by Neha Mehta
  Similarly, medical device companies often limit their patented products (e.g., a nebulizers, syringes, etc.) to a single use. [read post]
2 Mar 2016, 4:26 pm by Kevin LaCroix
  The device at issue is an iPhone 5c, used by Syed Rizwan Farook, who with his wife, Tashfeen Malik, opened fire during a holiday party at the Inland Regional Center in the San Bernardino massacre, killing 14 people and injuring 22 others. [read post]
13 Jan 2016, 5:05 pm by Kevin LaCroix
John Reed Stark David Fontaine In this day and age, the members of the boards of directors of most companies understand that cybersecurity issues are both important and should be a board-level priority. [read post]
16 Dec 2015, 9:26 am by Robert B. Milligan
Specifically, the webinar involved a discussion of non-compete and trade secret issues in Europe and China as compared to the United States. [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
What steps does the company undertake in the realm of security science to stay current about the latest cybersecurity intrusion modus operandi, cybersecurity-related software patches,[6] data breach trends, etc.? [read post]