Search for: "Authentic Designs"
Results 621 - 640
of 2,918
Sorted by Relevance
|
Sort by Date
22 Oct 2012, 12:17 pm
GPO used the State Focused Action Plans, which were designed to document what states or depository regions have identified in their individual library and state forecasts as important issues, to identify common themes. [read post]
10 Jan 2024, 9:00 pm
No declarations were filed by Canada (apart from the designated Competent Authorities). [read post]
20 Jul 2020, 7:30 am
Implement encryption and multifactor authentication. [read post]
11 Sep 2018, 1:16 pm
The law defines “authentication” as “a method of verifying the authority of a user, process, or device to access resources in an information system. [read post]
19 Apr 2021, 9:14 am
(Note that NFTs can be designed to pay the artist a percentage of any re-sale proceeds). [read post]
26 Mar 2012, 6:24 am
As early as last week, Pinterest gave the following instruction to users: ”Pinterest is designed to curate and share things you love. [read post]
9 Nov 2016, 9:29 am
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]
3 Jul 2006, 11:35 am
While players must supply a CD-Key to connect to bnetd, its validity is not authenticated as on Battle.net, thus allowing potentially pirated copies to be connected. [read post]
31 Jan 2007, 9:35 am
Using an https: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP. [read post]
21 Aug 2023, 2:32 am
A pivotal issue arises: whether NFTs should be treated as virtual goods in their own right or as certificates of authenticity. [read post]
27 Feb 2015, 8:26 am
They do share designs, but against outsiders they won’t share. [read post]
27 Sep 2017, 11:42 am
Some of the headlines are designed to appeal to the political interests of the targets, such as: “George W. [read post]
23 Aug 2021, 7:01 am
But blockchain technologies, and some other technical design approaches, can whittle away at the problem. [read post]
25 May 2011, 6:00 pm
It had the unusual security feature of not requiring any authentication at all, allowing anyone connecting to port 8500 to send commands to the server. [read post]
5 Nov 2021, 8:55 am
For security reasons, we suggest enabling 2-factor authentication with the appropriate emails instead of opting out. [read post]
18 Nov 2010, 9:12 am
I predict we will see a variety of additional legal moves designed to prop up online authenticity using regulatory tools [read post]
2 Feb 2024, 5:41 am
Read the full story here Latvian city Daugavpils joins European Network of Authenticities On 11 December 2023, the municipality of Daugavpils in Latvia joined the subproject called European Network of Authenticities of the European Cooperation Project (ECP8). [read post]
17 May 2010, 3:10 pm
Authenticity is invaluable; originality is nonexistent. [read post]
22 Jun 2010, 6:27 pm
Here are the legal-informatics topics, from the topics about which papers are invited: Challenges to e-Government: Interoperability; Language issues; Identity Management – including Authentication, Trust and Privacy; Semantics of transactions in e-Government, definitions and implementations e-Voting e-Democracy: ICT and the case of deliberative democracy; Using Blogs and Wikis to enhance participation; Citizen trust in online participation and dialogue; The design of… [read post]
21 Nov 2020, 9:09 pm
Types of control related to traceability and labeling, processes, and checking product quality and authenticity. [read post]