Search for: "Electronic Data Systems Corporation" Results 581 - 600 of 2,107
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Sep 2019, 3:31 pm by Jacob Schulz, William Ford
In addition, NSA is also charged with the protection of U.S. national security systems, including Department of Defense worldwide computer networks and other systems. [read post]
16 Sep 2019, 5:00 am by Wyatt Hoffman, Ariel E. Levite
Moreover, the ACDCA addresses only criminal liability under the CFAA, giving corporations little clarity regarding other state laws and a number of statutes relating to electronic surveillance potentially in play. [read post]
13 Sep 2019, 1:19 pm by Jason Kelley
EFF’s annual Pioneer Awards ceremony celebrates individuals and groups who have made outstanding contributions to freedom and innovation on the electronic frontier. [read post]
11 Sep 2019, 7:22 am by Paulette Thomas
Integration and interoperability of electronic data generated from telehealth services into the electronic health record and health information exchanges. [read post]
5 Sep 2019, 2:42 pm by Rob Robinson
The remaining 24% of responders were either part of a consultancy (12%), a corporation (6%), the government (3%), or another type of entity (3%). [read post]
5 Sep 2019, 9:51 am by Christopher Adcock
The bill specifies that any corporation using an electronic data system to prepare such a shareholder list must ensure the information included in the list is available only to the corporation’s shareholders. [read post]
3 Sep 2019, 8:11 am by Matthew Kahn
For instance, applicants might work as an engineer, computer scientist, or business executive at a technology company; might be trained as a data scientist or in human-computer interaction; might work at a university or at a think tank studyin [read post]
26 Aug 2019, 10:03 am by Mikhaila Fogel
Programming to support the development of policy outputs during the fellowship will include: An orientation introducing fellows to the fellowship, to the other fellows, and to the policymaking process; Regular classes exploring what policy is, how to identify problems, defining alternatives, developing relevant outputs, and communicating to stakeholders; Action-oriented practical exercises, such as ‘how to write a policy memo’ or ‘how to give an elevator pitch’, founded on… [read post]
26 Aug 2019, 5:00 am by Bruce Schneier
This is also true for corporate applications. [read post]
19 Aug 2019, 8:36 am by Vishnu Kannan
For instance, applicants might work as an engineer, computer scientist, or business executive at a technology company; might be trained as a data scientist or in human-computer interaction; might work at a university or at a think tank studying cybersecurity, artificial intelligence, or the Internet of Things; or might have professional technology experience such as [read post]
12 Aug 2019, 8:33 am by Vishnu Kannan
For instance, applicants might work as an engineer, computer scientist, or business executive at a technology company; might be trained as a data scientist or in human-computer interaction; might work at a university or at a think tank studying cybersecurity, artificial intelligence, or the Internet of Things; or might have professional technology experience such as serving as a patent lawyer. [read post]
9 Aug 2019, 1:00 pm
” The Ninth Circuit’s ruling is important not only because it explains why surreptitious use of face recognition by corporations harms people’s privacy interests, but also because it puts law enforcement on notice that recent Supreme Court cases regulating other forms of electronic surveillance have something to say about face surveillance technology. [read post]
9 Aug 2019, 9:44 am by Rob Robinson
Editor’s Note: With the growing concerns and challenges associated with data security in mind, the following four extracts on the insidious cyberattack technique called “worshipping” provide an explanation and describe the egregious nature of this attack to infiltrate corporate networks. [read post]
5 Aug 2019, 1:16 pm by Vishnu Kannan
The Research Analyst also plays a key role in building Brookings’s research on artificial intelligence and other emerging technologies and employs technical and analytical skills, including data science, to investigate new and existing ways emerging technologies affect democracy. [read post]
29 Jul 2019, 12:20 pm by Vishnu Kannan
The Research Analyst also plays a key role in building Brookings’s research on artificial intelligence and other emerging technologies and employs technical and analytical skills, including data science, to investigate new and existing ways emerging technologies affect democracy. [read post]
25 Jul 2019, 12:00 am by Hannah Diaz
Assert a legal right to manage your data and that withdrawing access to your data from corporations is your right. [read post]
24 Jul 2019, 6:06 am by Kevin Kaufman
If a state must offer a “holiday” from its tax system, it is an implicit recognition that the state’s tax system is uncompetitive. [read post]
23 Jul 2019, 4:30 pm by Kevin LaCroix
A token is a digital asset that can be used in many ways — for example, as a unit of value (or as means of providing access to and transactional value inside a particular blockchain system (e.g., retail allows access to electronic data storage space in Sia’s blockchain ecosystem). [read post]
22 Jul 2019, 11:23 am by Vishnu Kannan
Event Announcements (More details on the Events Calendar) Monday, July 22, 2019, 3:30 p.m.: The Center for Strategic and International Studies (CSIS) will hold an event titled, “Homeland Defense and the Role of NORAD and USNORTHCOM: A Conversation with General Terrence J. [read post]