Search for: "Authentic Designs" Results 521 - 540 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Nov 2006, 7:06 pm
  I own no Uggs, so I have no idea in the particular case, but it's possible that the piracy paradox isn't quite so paradoxical if rapid innovation in fashion design is confined mostly to the top of the fashion pyramid, and if the designers at the top (and their customers) traffic in authenticity and scarcity more than, or at least as much, they traffic in innovative design. [read post]
4 Jan 2018, 9:48 am by Nicholas Weaver
The web browser maintains a key set of isolation barriers, called the same origin policy, that are designed to prevent JavaScript running in one website from reading key information (such as authentication cookies) belonging to a different website. [read post]
8 Dec 2018, 3:06 am
Their design includes a directional marker so it is easy for the consumer, retailers and customs to authenticate products. [read post]
24 Oct 2016, 6:41 am by Jonathan Zittrain
Or they could designate family or friends to hold key fragments. [read post]
26 Sep 2017, 6:51 am
Under the eIDAS Regulation, Member States designate the supervisory body established in their territory, or in the territory of another Member State subject to an agreement with the latter. [read post]
I have always had a passion for communications, curriculum design, and connecting with others that permeates throughout all the work that I do. [read post]
10 Dec 2014, 4:56 am
Strategic Information Professionals are the most important  pre-requisite in designing a digital library strategy. [read post]
9 Oct 2021, 11:30 pm by Thaddeus Mason Pope, JD, PhD
Next, the presenter will explain a novel step-by-step method for clarifying a patient’s authentic preferences and categorizing a particular case. [read post]
12 Aug 2010, 3:39 am by Susan Perera
Structure Sport & Design Structure Sport & Design Structure Jeanswear & Design Structure Authentic Jeanswear & Design Structure V X XX XXX XL & Design  Another 6 Structure & Design marks were never assigned to Sears and have also gone abandoned or have been canceled. [read post]
6 Jan 2023, 8:42 am by Mark D. Rasch
While some software updates are designed to improve or enhance functionality, many updates are designed to protect the privacy or security of the user or the community. [read post]
11 Apr 2011, 2:02 pm by Hopkins
Rules requiring affidavits to authenticate documents; rules designed to require that pleadings be set forth in a certain way; rules that prohibit one party from speaking to judges about their case outside the presence of the opposing party; these are all rules in place for good reason. [read post]
17 Dec 2015, 4:55 am by Randi Morrison
Astounding in its depth and breadth, the new regulatory requirements would be expected to cover these areas, at a minimum: Implementation of written cybersecurity policies & procedures Implementation of policies & procedures to ensure data security accessible to/held by third parties Use of multi-factor authentication as it applies to enumerated applications, servers, data Designation of a CISO with enumerated responsibilities, including annual reporting to the NYDFS… [read post]
22 Jun 2017, 11:37 am by Will R. Daugherty
Scanning a company’s public-facing systems for indications of vulnerabilities, such as out-of-date operating systems, the absence of multifactor authentication and poor patching practices. [read post]
22 Jun 2017, 11:37 am by Will R. Daugherty
Scanning a company’s public-facing systems for indications of vulnerabilities, such as out-of-date operating systems, the absence of multifactor authentication and poor patching practices. [read post]
11 Apr 2011, 2:02 pm by Hopkins
Rules requiring affidavits to authenticate documents; rules designed to require that pleadings be set forth in a certain way; rules that prohibit one party from speaking to judges about their case outside the presence of the opposing party; these are all rules in place for good reason. [read post]
20 Apr 2020, 11:41 am by Hannah Lepow and Jayne Ponder
  Specifically, the FTC recommends that IoT companies: implement “security by design” by implementing security measures in products at the outset of product design and development efforts and by conducting vulnerability and penetration testing before product release; encourage a culture of security through written security standards and designating a senior official responsible for security; design products with secure authentication in… [read post]
26 Dec 2018, 7:00 am by Susan Landau
Either the provider fails to reveal the list of participants of an encrypted communication, or the system is designed so that it can present a modified—as in, incomplete—list when adding a law-enforcement eavesdropper. [read post]
24 Dec 2014, 4:50 am by Ron Coleman
 For buttons that were removed from authentic designer clothing. [read post]
27 Feb 2014, 3:09 pm by Ron Coleman
 For buttons that were removed from authentic designer clothing. [read post]
14 Feb 2016, 3:35 pm by Benjamin Wittes, Zoe Bedell
Uncertainty as to the authenticity of the individual accounts may create a real question as to whether Twitter is “knowingly” providing service to terrorist groups. [read post]