Search for: "Authentic Designs "
Results 621 - 640
of 2,902
Sorted by Relevance
|
Sort by Date
19 Apr 2021, 9:14 am
(Note that NFTs can be designed to pay the artist a percentage of any re-sale proceeds). [read post]
31 Jan 2007, 9:35 am
Using an https: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP. [read post]
22 Oct 2012, 12:17 pm
GPO used the State Focused Action Plans, which were designed to document what states or depository regions have identified in their individual library and state forecasts as important issues, to identify common themes. [read post]
9 Nov 2016, 9:29 am
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]
10 Jan 2024, 9:00 pm
No declarations were filed by Canada (apart from the designated Competent Authorities). [read post]
20 Jul 2020, 7:30 am
Implement encryption and multifactor authentication. [read post]
21 Aug 2023, 2:32 am
A pivotal issue arises: whether NFTs should be treated as virtual goods in their own right or as certificates of authenticity. [read post]
27 Feb 2015, 8:26 am
They do share designs, but against outsiders they won’t share. [read post]
27 Sep 2017, 11:42 am
Some of the headlines are designed to appeal to the political interests of the targets, such as: “George W. [read post]
23 Aug 2021, 7:01 am
But blockchain technologies, and some other technical design approaches, can whittle away at the problem. [read post]
22 Jun 2010, 6:27 pm
Here are the legal-informatics topics, from the topics about which papers are invited: Challenges to e-Government: Interoperability; Language issues; Identity Management – including Authentication, Trust and Privacy; Semantics of transactions in e-Government, definitions and implementations e-Voting e-Democracy: ICT and the case of deliberative democracy; Using Blogs and Wikis to enhance participation; Citizen trust in online participation and dialogue; The design of… [read post]
17 May 2010, 3:10 pm
Authenticity is invaluable; originality is nonexistent. [read post]
12 May 2023, 2:03 pm
For example, Control 3.5.12, “Authenticator Management,” now allows agencies to define the authenticator refreshment time period or, if the agency prefers, require refreshment when an agency-defined event occurs. [read post]
2 Feb 2024, 5:41 am
Read the full story here Latvian city Daugavpils joins European Network of Authenticities On 11 December 2023, the municipality of Daugavpils in Latvia joined the subproject called European Network of Authenticities of the European Cooperation Project (ECP8). [read post]
5 Nov 2021, 8:55 am
For security reasons, we suggest enabling 2-factor authentication with the appropriate emails instead of opting out. [read post]
21 Nov 2020, 9:09 pm
Types of control related to traceability and labeling, processes, and checking product quality and authenticity. [read post]
25 May 2011, 6:00 pm
It had the unusual security feature of not requiring any authentication at all, allowing anyone connecting to port 8500 to send commands to the server. [read post]
28 Apr 2014, 8:33 am
You need to be authentic to back up your claim. [read post]
18 Nov 2010, 9:12 am
I predict we will see a variety of additional legal moves designed to prop up online authenticity using regulatory tools [read post]
8 Mar 2010, 12:38 pm
Will three lines or three buttons spell the difference between an authentic BCBG Max Azaria dress and a cheap H&M version? [read post]