Search for: "Authentic Designs " Results 621 - 640 of 2,902
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
19 Apr 2021, 9:14 am by Philip R. Stein
(Note that NFTs can be designed to pay the artist a percentage of any re-sale proceeds). [read post]
31 Jan 2007, 9:35 am by KnightsBridge Castle
Using an https: URL indicates that HTTP is to be used, but with a different default port (443) and an additional encryption/authentication layer between HTTP and TCP. [read post]
22 Oct 2012, 12:17 pm by aallwash
GPO used the State Focused Action Plans, which were designed to document what states or depository regions have identified in their individual library and state forecasts as important issues, to identify common themes. [read post]
9 Nov 2016, 9:29 am by Woodruff Family Law Group
The children were placed in foster care, and mother signed a case plan designed to address her issues, which included mental health, substance abuse and intellectual disability. [read post]
10 Jan 2024, 9:00 pm by Mayela Celis
No declarations were filed by Canada (apart from the designated Competent Authorities). [read post]
20 Jul 2020, 7:30 am by Kim Phan and Katie Morehead
Implement encryption and multifactor authentication. [read post]
21 Aug 2023, 2:32 am by centerforartlaw
A pivotal issue arises: whether NFTs should be treated as virtual goods in their own right or as certificates of authenticity. [read post]
27 Feb 2015, 8:26 am by Rebecca Tushnet
They do share designs, but against outsiders they won’t share. [read post]
27 Sep 2017, 11:42 am by cooperq
Some of the headlines are designed to appeal to the political interests of the targets, such as: “George W. [read post]
22 Jun 2010, 6:27 pm by legalinformatics
Here are the legal-informatics topics, from the topics about which papers are invited: Challenges to e-Government: Interoperability; Language issues; Identity Management – including Authentication, Trust and Privacy; Semantics of transactions in e-Government, definitions and implementations e-Voting e-Democracy: ICT and the case of deliberative democracy; Using Blogs and Wikis to enhance participation; Citizen trust in online participation and dialogue; The design of… [read post]
  For example, Control 3.5.12, “Authenticator Management,” now allows agencies to define the authenticator refreshment time period or, if the agency prefers, require refreshment when an agency-defined event occurs. [read post]
2 Feb 2024, 5:41 am by Kluwer IP Reporter
Read the full story here Latvian city Daugavpils joins European Network of Authenticities On 11 December 2023, the municipality of Daugavpils in Latvia joined the subproject called European Network of Authenticities of the European Cooperation Project (ECP8). [read post]
5 Nov 2021, 8:55 am by Marina Wilson
For security reasons, we suggest enabling 2-factor authentication with the appropriate emails instead of opting out. [read post]
21 Nov 2020, 9:09 pm by News Desk
Types of control related to traceability and labeling, processes, and checking product quality and authenticity. [read post]
25 May 2011, 6:00 pm
It had the unusual security feature of not requiring any authentication at all, allowing anyone connecting to port 8500 to send commands to the server. [read post]
18 Nov 2010, 9:12 am by Eric
I predict we will see a variety of additional legal moves designed to prop up online authenticity using regulatory tools [read post]
8 Mar 2010, 12:38 pm by anna su
Will three lines or three buttons spell the difference between an authentic BCBG Max Azaria dress and a cheap H&M version? [read post]