Search for: "Automation Systems v. Standard Automation"
Results 421 - 440
of 570
Sort by Relevance
|
Sort by Date
25 Jun 2014, 2:16 pm
Co. v. [read post]
19 Jun 2014, 4:14 pm
In Mayo Collaborative Services v. [read post]
18 Jun 2014, 8:58 pm
Graham v. [read post]
2 Jun 2014, 12:48 pm
A recent essay from law professor John McGinnis, titled “Machines v. [read post]
17 Apr 2014, 4:00 am
The Sedona text, The Sedona Canada Principles—Addressing Electronic Discovery (January 2008), approves of searching by “automated methods,” stating (p. 4): Counterbalancing the dispersed nature of electronically stored information is the fact that some forms and media can be searched quickly and fairly accurately by automated methods. [read post]
16 Apr 2014, 7:10 am
Options Exch, Inc. v. [read post]
15 Apr 2014, 7:40 am
Unfortunately, a new front may have opened up in a case called Gardner v. [read post]
4 Apr 2014, 3:04 pm
Registry to connect rightsholders and info and will digitally manage automated licensing. [read post]
3 Apr 2014, 12:50 pm
Settlement of Viacom v. [read post]
13 Mar 2014, 11:48 am
Siemenski: we don’t really know because there are too few cases, because of the great imbalance of power between those sending the notices and those receiving them—big corporations v. individual users.Coble for Bridy: should Congress create incentives for voluntary systems to address infringement, and if so what? [read post]
6 Mar 2014, 10:54 am
The CFTC’s Division of Swap Dealer and Intermediary Oversight, which issued Staff Advisory 14-21, will “enhance its audit and review standards as it continues to focus more resources on GLBA Title V compliance. [read post]
1 Mar 2014, 3:37 pm
McIntyre Machinery, Ltd v Nicastro131 S.Ct. 2780 (2011), Football Dataco Ltd. v Sportradar GmbH, Case C‑173/11, 18 October, 2012. [read post]
19 Feb 2014, 2:11 pm
Finally, the Roadmap identifies nine cybersecurity disciplines marked for further development and discussion including: (i) authentication; (ii) automated indicator sharing; (iii) conforming cybersecurity assessments; (iv) preparation of a skilled cybersecurity workforce; (v) use of data analytics in cybersecurity; (vi) Federal agency cybersecurity alignment; (vii) international coordination; (viii) supply chain risk management; and (ix) technical privacy standards. [read post]
19 Feb 2014, 2:07 pm
Finally, the Roadmap identifies nine cybersecurity disciplines marked for further development and discussion including: (i) authentication; (ii) automated indicator sharing; (iii) conforming cybersecurity assessments; (iv) preparation of a skilled cybersecurity workforce; (v) use of data analytics in cybersecurity; (vi) Federal agency cybersecurity alignment; (vii) international coordination; (viii) supply chain risk management; and (ix) technical privacy standards. [read post]
14 Jan 2014, 9:48 am
Mar. 15, 2013) (noting that predictive coding is “an automated method that credible sources say has been demonstrated to result in more accurate searches at a fraction of the cost of human reviewers” and relying in part on its availability to reject a law firm’s undue burden objection to a subpoena served on it); Harris v. [read post]
17 Dec 2013, 3:49 pm
Steele v. [read post]
17 Dec 2013, 5:11 am
This may include takedowns that are a result of either overzealous or inexperienced/mistaken creators, or automated processes. [read post]
10 Nov 2013, 5:30 am
Idaho 2013http://t.co/rcr4092Nau -> Copyright in advertisements canvassed in Harner v. [read post]
4 Nov 2013, 9:46 am
” A more reasonable and balanced system should be possible. [read post]
16 Oct 2013, 4:34 am
Center v. [read post]