Search for: "Doe Two: Unknown Identity" Results 661 - 680 of 912
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Aug 2012, 2:52 am by admin
Whenever a name is more than two syllables, you can be sure that someone will try and find a short nickname to replace it. [read post]
18 Aug 2012, 11:01 am by oliver
However, the latter is identical to the ratio of functional groups as calculated on the basis of the amounts of starting materials employed. [read post]
17 Aug 2012, 9:45 am by Steve Hall
Its applicability to any individual is unknown, however, given that many other factors could increase the likelihood of violence, researchers said. [read post]
4 Aug 2012, 12:01 am by tekEditor
Technological innovations in communication dating back to the printing press tended to fall into two categories. [read post]
3 Aug 2012, 2:41 am by tekEditor
Unknown column” errors or bad data could result from changing the set of columns in a table used within a stored program between executions of the program or while the table was used within a program loop. [read post]
13 Jul 2012, 5:08 pm by Venkat
Risk of future identity theft: It is an understatement to say that courts are skeptical of litigants’ claims for risk of future identity theft . . . . [read post]
11 Jul 2012, 5:51 am by Jenna Greene
Porn Piracy - Or Not: It's a common tactic for pornography producers trying to protect their product from online piracy: They sue unknown "John Does" who illegally download movies, then go to Internet providers to learn their true identities and collect. [read post]
3 Jul 2012, 11:53 am by Lyle Denniston
How does the CBS story deal with that part of the switch? [read post]
26 Jun 2012, 12:14 pm
The identities of the woman and the children have not been released to the pubic, and the children's' genders are likewise unknown. [read post]
14 Jun 2012, 1:30 am
The woman, whose identity is unknown at this time, was taken to a hospital where she later succumbed to her injuries. [read post]
2 Jun 2012, 12:12 pm by Abhik Majumdar
Moreover, it was in the nature of a "John Doe injunction", that is, it applied to any and all persons, even unknown ones. [read post]
29 May 2012, 3:36 am by SHG
Validation does not create truths, but rather principles at best. [read post]
18 May 2012, 3:48 am by Dan Harris
  The decision pertained to two joined cases—one case involved a shipment of electric shavers coming from China (with an unknown destination) that allegedly infringed on the design protection of a Philips product. [read post]
10 May 2012, 3:58 pm by Kim Zetter
Merrill and the ACLU filed a legal challenge under the name “John Doe,” since they weren’t allowed to identify Merrill or the name of his ISP. [read post]
7 May 2012, 2:38 pm by Paul Rosenzweig
” http://gcn.com/articles/2006/08/17/red-storm-rising.aspx Department of Education: August 2006 – Computers containing personal info of grant reviewers were stolen. http://www.idtheftcenter.org/artman2/uploads/1/ITRC_Breach_Report_20061231.pdf Department of Energy: Nuclear Security Administration – October 2011 – A DOE report disclosed that the department has been hit by recent successful cyber attacks.… [read post]
7 May 2012, 5:00 am by Bexis
  Two, since both Mensing and Wyeth v. [read post]
3 May 2012, 1:02 pm by Venkat
(The two statutes are not identical and it’s unclear as to whether a network could prohibit scraping or other unauthorized access.) [read post]