Search for: "Authentic Designs " Results 541 - 560 of 2,900
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Apr 2019, 8:29 am by Richa Srivastava
The enumerated weaknesses include: 1) Active attacks using a false BTS; 2) Cipher keys and authentication data transmitted in clear between and within networks; 3) Encryption not extending far enough towards the core network; 4) User authentication using a previously generated cipher key and the provision of protection against channel hijack rely on the use of encryption, but not all networks use encryption, leaving opportunities for fraud; 5) Data integrity is not provided; 6) The… [read post]
2 Sep 2011, 8:33 am by Kent Scheidegger
  We would rather have all commenters identified with a recognizable, consistent handle, so we and the readers can easily see that these comments are all from the same person.So, to be designated a "trusted" commenter, use one of the authentication methods that provides a recognizable handle and your real email address. [read post]
17 May 2015, 1:50 pm by Steve Sheinberg
Require the ability to push authenticated patches and software updates. [read post]
14 Aug 2013, 8:53 pm by Megan Carpenter
  Dekel stated that “working with the [Native American] community in an endemic and sincere and authentic fashion has been an incredibly refreshing experience… and one that we hope will be looked at by others in the fashion design and licensing industries as a template. [read post]
18 Jan 2011, 8:08 am by William Carleton
Speaking now to those who found social networks: IMHO the place to start is to honor authentic speech and to put the technology to the service of natural persons. [read post]
27 Jan 2019, 8:39 am by Andrew Delaney
He designated his niece and nephew as beneficiaries. [read post]
9 Aug 2010, 2:12 am by John L. Welch
Opposer failed to land any of its three offensive thrusts - likelihood of confusion, non-use, and fraud - in its opposition to registration of the mark BLACK BELT TV & Design (shown below) for television programming in the field of martial arts [TV disclaimed]. [read post]
3 Feb 2017, 1:37 pm
This post examines an opinion from the Court of Appeals of Texas, El Paso: O’Brien v. [read post]
29 Jul 2009, 2:03 pm
When it comes to the topic of (re)designing client-centric legal services, I’ve found a muse in Spike Jones. [read post]
23 Jun 2022, 9:54 am by Nikki Siesel
In response, the Respondent submitted declarations each declaring that the specimens attached to the Declaration of Use respectively on January 29, 2016, and on the February 3, 2020, were authentic. [read post]
  AV manufacturers will need to consider these risks and address them early in the design and development process of their products. [read post]
20 Sep 2011, 12:33 pm by Kimberly Merriman
Each coming with forged certificates of authenticity. [read post]
20 Jul 2011, 8:11 pm
Given that the logo’s color scheme, overall design and Italian name are all similar to Lamborghini, the coincidence is a little far-fetched. [read post]
24 Nov 2008, 8:03 am
In purchasing an electronic resource, the librarian must be familiar with licensing models, system requirements, file compatibility, authentication, proxy servers, and interface design. [read post]
3 Jun 2007, 11:09 pm
  MADtv's Nicole Parker wore a white pantsuit reminiscent of Ellen's Oscar attire and draped authentic handbags designed by nominees Derek Lam, Marc Jacobs, and Michael Kors around her neck and over her arms. [read post]
29 Nov 2011, 10:51 am by Kim Zetter
Because the HP firmware doesn’t require a digital signature to verify that an upgrade is authentic, attackers can send specially crafted files to the printer that contain malicious code. [read post]