Search for: "Authentic Designs" Results 621 - 640 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
22 Oct 2012, 12:17 pm by aallwash
GPO used the State Focused Action Plans, which were designed to document what states or depository regions have identified in their individual library and state forecasts as important issues, to identify common themes. [read post]
10 Jan 2024, 9:00 pm by Mayela Celis
No declarations were filed by Canada (apart from the designated Competent Authorities). [read post]
20 Jul 2020, 7:30 am by Kim Phan and Katie Morehead
Implement encryption and multifactor authentication. [read post]
11 Sep 2018, 1:16 pm by David M. Stauss
The law defines “authentication” as “a method of verifying the authority of a user, process, or device to access resources in an information system. [read post]
19 Apr 2021, 9:14 am by Philip R. Stein
(Note that NFTs can be designed to pay the artist a percentage of any re-sale proceeds). [read post]
26 Mar 2012, 6:24 am by Steve Eder
As early as last week, Pinterest gave the following instruction to users: ”Pinterest is designed to curate and share things you love. [read post]
9 Nov 2016, 9:29 am by Woodruff Family Law Group
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]
3 Jul 2006, 11:35 am
While players must supply a CD-Key to connect to bnetd, its validity is not authenticated as on Battle.net, thus allowing potentially pirated copies to be connected. [read post]
31 Jan 2007, 9:35 am by KnightsBridge Castle
Using an https: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP. [read post]
21 Aug 2023, 2:32 am by centerforartlaw
A pivotal issue arises: whether NFTs should be treated as virtual goods in their own right or as certificates of authenticity. [read post]
27 Feb 2015, 8:26 am by Rebecca Tushnet
They do share designs, but against outsiders they won’t share. [read post]
27 Sep 2017, 11:42 am by cooperq
Some of the headlines are designed to appeal to the political interests of the targets, such as: “George W. [read post]
25 May 2011, 6:00 pm
It had the unusual security feature of not requiring any authentication at all, allowing anyone connecting to port 8500 to send commands to the server. [read post]
5 Nov 2021, 8:55 am by Marina Wilson
For security reasons, we suggest enabling 2-factor authentication with the appropriate emails instead of opting out. [read post]
18 Nov 2010, 9:12 am by Eric
I predict we will see a variety of additional legal moves designed to prop up online authenticity using regulatory tools [read post]
2 Feb 2024, 5:41 am by Kluwer IP Reporter
Read the full story here Latvian city Daugavpils joins European Network of Authenticities On 11 December 2023, the municipality of Daugavpils in Latvia joined the subproject called European Network of Authenticities of the European Cooperation Project (ECP8). [read post]
22 Jun 2010, 6:27 pm by legalinformatics
Here are the legal-informatics topics, from the topics about which papers are invited: Challenges to e-Government: Interoperability; Language issues; Identity Management – including Authentication, Trust and Privacy; Semantics of transactions in e-Government, definitions and implementations e-Voting e-Democracy: ICT and the case of deliberative democracy; Using Blogs and Wikis to enhance participation; Citizen trust in online participation and dialogue; The design of… [read post]
21 Nov 2020, 9:09 pm by News Desk
Types of control related to traceability and labeling, processes, and checking product quality and authenticity. [read post]