Search for: "Computer Programs and Systems, Inc." Results 381 - 400 of 1,495
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
MACRS consists of the General Depreciation System (GDS) and the Alternative Depreciation System (ADS). [read post]
MACRS consists of the General Depreciation System (GDS) and the Alternative Depreciation System (ADS). [read post]
24 Jul 2017, 5:10 pm by Kevin LaCroix
”  The policy defines a “Computer Violation as both “the fraudulent (a) entry of Data into … a Computer System; [and] (b)change to Data elements or program logic of a Computer System, which is kept in machine readable format … directed against an Organization. [read post]
24 Jul 2017, 11:36 am by Robert Chesney
(ii) Robust command and control systems and processes have been established for planning, deconflicting, and executing military cyber operations. [read post]
3 Jul 2017, 5:07 am
[Section 2(d) refusal of SLIMDIP for "Modules in the nature of power semiconductor devices for power line conditioner; integrated circuit modules for power line conditioner," in view of the registered mark SLIM for "semiconductors; computer hardware; integrated circuits; electronic system architecture and microelectromechanical system devices and structures, namely, programmable semiconductor chips"]. [read post]
31 May 2017, 3:12 am by Kevin LaCroix
Federal Insurance Company, the Ninth Circuit held that losses resulting from wire transfers that emanated from fraudulent emails were not an unauthorized entry into a computer system or an introduction of instructions that propagated themselves through the computer system.[1]  Thus, the court held that coverage under the computer fraud coverage was unavailable. [read post]
10 May 2017, 12:23 am by Sander van Rijnswou
Thus, the invention replaces the three-machine prior art (consumer's computer, merchant's server, authenticating server) with a four-machine system (consumer's computer, merchant's server, authenticating server, and "merchant authentication processing system" - MAPS).The starting point for inventive step5. [read post]
26 Apr 2017, 6:14 pm by Cynthia Marcotte Stamer
Like many previous resolution agreements announced by OCR, the Resolution Agreement reiterates the responsibility of covered entities and business associates to properly secure their ePHI and that as part of this process, OCR expects all laptop computers and other mobile devices containing or with access to ePHI be properly encrypted and secured. [read post]
10 Apr 2017, 12:22 pm by Dave Aitel
Even when you are not trying to hide, there is always that chance: how many times has an anti-virus program blue-screened your Windows box by mistake? [read post]
6 Apr 2017, 4:00 am by Administrator
Michael Maschke, CEO of Sensei Enterprises, Inc. [read post]
31 Mar 2017, 9:00 am by Sarah Tate Chambers
Novell, creators of WordPerfect software programs, brought suit against Microsoft for withdrawing independent software vendors’ (ISVs) access to part of Windows 95’s application programming interfaces and thus furthering Microsoft’s monopoly of Intel-related personal computer systems. [read post]
27 Mar 2017, 9:33 am by Jordan Brunner
The author of the first-place winning entry will receive a cash prize of $2,000 provided by the Air Force JAG School Foundation, Inc. [read post]
23 Mar 2017, 10:00 pm by Cookson Beecher
“Building a safer and more equitable food system,” is EFI’s motto. [read post]