Search for: "Authentic Designs " Results 481 - 500 of 2,900
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
9 Jun 2021, 8:20 am
Applicant SICPA Holding SA ran into double trouble when it applied to register the mark SHIFTMAG for "security consulting in the nature of professional consulting on magnetic stripe color shifting smart designs based on liquid crystal technology for visual card authentication, embed protection and brand identity customization. [read post]
13 Feb 2017, 10:00 pm by Afro Leo
The “bubble tag” is a sticker that is placed over the cork and the glass with a random bubble design. [read post]
27 Mar 2018, 9:14 am by Peter Stockburger
The threat actors ultimately seek to gain information from the intended target on “network and organizational design and control system capabilities within organizations. [read post]
25 Jan 2015, 7:13 am by Steve Kalar
Of historical interest: the D.J. in Hinkson case was Judge Tallman, sitting by designation. [read post]
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
8 Apr 2014, 3:36 pm by Yan Zhu
EFF has long advocated for websites to support HTTPS instead of plain HTTP to encrypt and authenticate data transmitted on the Internet. [read post]
8 Aug 2023, 10:57 am by Glenn S. Richards and Adam J. Sandler
Recent actions by the FCC are designed to decrease the number of unwanted and illegal phone calls and text messages that reach you. [read post]
7 Oct 2020, 7:09 am by Bryan Gort
Firewalls – A Web Application Firewall (“WAF”) is a firewall specifically designed for web use that can detect credential stuffing attacks. [read post]
9 Sep 2007, 3:43 pm
A weekly (or thereabouts) collection of news about counterfeits, fakes, knockoffs, replicas, imitations, and the culture of copying in general around the globe: Sole proprietor: Louboutin sees red over knockoffsAuction block: Gucci threatens eBay with lawsuitLucky charms: New micro-tech marks authentic goods without marring designBiotech: Botanical DNA used to mark authentic productsAll together now: APEC joint statement condemns counterfeitsUnited they fall: Manchester is… [read post]
29 Apr 2014, 6:00 am by Duets Guest Blogger
And, the most authentic representation of the Chipotle brand in William Espy’s speech on how they are changing the economics of better food sourced from better origins. [read post]
31 Aug 2007, 6:53 am
It found that producer "has not provided any evidence to support its assertion that the authenticity of its engineering opinions…might be compromised. [read post]
6 Sep 2010, 10:01 pm by J. Benjamin Stevens
[W]ith the second version [of the iPhone], it was possible for IT to design and install security certifications for a second layer of password authentication, and it was possible to do remote wipes of data on iPhones that were stolen or lost. [read post]
7 Mar 2007, 7:18 am
Experience Hendrix, LLC, and Authentic Hendrix, LLC, filed suit yesterday in the Western District against Washington-based Electric Hendrix, LLC, Electric Hendrix Apparel, LLC, Electric Licensing, LLC, and Craig Diffenbach. [read post]
18 Apr 2011, 9:06 pm by Ruth Levor
The realization of this vision is the user-centric “Identity Ecosystem” described in this Strategy It is an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities—and the digital identities of devices The Identity Ecosystem is designed to securely support transactions that range from anonymous to fully-authenticated and from low-… [read post]
23 Apr 2024, 7:43 pm by Sabrina I. Pacifici
Apple has a process called Account Recovery that is designed for use by anyone who has set up two-factor authentication. [read post]
5 Feb 2007, 4:42 pm
She concludes that IACA's rules on issues like strict liability should differ from Lanham Act rules, even though courts so far have treated IACA as just another trademark/designation of origin law. [read post]