Search for: "CENTRAL TIME COMPUTATION UNIT" Results 761 - 780 of 1,527
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Feb 2016, 4:19 am by Henry Farrell
This leads, as Segal puts it, to “a central paradox for the United States: economic and technological sophistication are” not only sources of power and domination, but “also sources of vulnerability. [read post]
31 May 2019, 8:00 am by Guest Blogger
Finally, states with a strong commitment to free expression, like the United States, would find it difficult to censor content that was not illegal except under time, place, and manner restrictions that are difficult to translate to the internet. [read post]
22 Jun 2016, 11:40 am by Caitlin Gilligan, Rishabh Bhandari
For more, check out the Times and the Journal. [read post]
30 Jun 2014, 8:06 am by Kelly Phillips Erb
Those United States persons who are required to file an FBAR includes those with a financial interest in or signature authority over at least one financial account located outside of the United States if the aggregate value of all foreign financial accounts exceeded $10,000 at any time during the calendar year. [read post]
14 Mar 2016, 6:19 am
’Published weekly, Respublika principally covers business and politics in Kazakhstan, a country in central Asia. [read post]
8 Jul 2014, 9:23 am by John Gregory
This has been the case for operations that facilitate file-sharing, and for those that formed centrally available collections of infringing material. [read post]
8 May 2023, 5:31 am by Alicia Wanless
And the problem of degrading the information environment is central to the slippage. [read post]
23 May 2022, 3:35 am by Kluwer Patent blogger
The best example is the United Nations Dispute Tribunal and United Nations Appeals Tribunal (UNAT), a two-tier system established in 2009 amongst others because the previous mechanism was deemed too slow. [read post]
20 Jul 2024, 4:01 am by Rob Robinson
Despite the quick identification and rollback of the faulty update, the fix necessitated time-consuming manual interventions. [read post]
5 Nov 2011, 11:50 am by Jeralyn
US-based gangs have established strong working relationships with Central American and MDTOs [Mexican Drug Trafficking Organizations] to perpetrate illicit cross-border activity, as well as with some organized crime groups in some regions of the United States. [read post]
23 Jan 2017, 3:44 pm by Nate Russell
Maybe it’s time to consider what “reasonable efforts” means when guarding client data. [read post]
2 Nov 2014, 9:00 pm by Cody Poplin
Austin III, commander of US Central Command, for a conversation entitled The Islamic State and Beyond: US Military Strategy in the Middle East. [read post]
4 Mar 2011, 8:33 am
In the days where distribution of magazines was carried out largely via the post, one cannot imagine an ad in Time Magazine or the New Statesman that championed the distribution services of the United States Postal Office or the Royal Mail. [read post]
16 Aug 2008, 5:37 am
  Read on and find out.From the New York Times via Turley: Hiu Lui Ng was a New Yorker: a computer engineer with a job in the Empire State Building, a house in Queens, a wife who is a United States citizen and two American-born sons. [read post]
2 Jun 2010, 8:50 am
Department of State 42 Southwest Airlines 43 PricewaterhouseCoopers, LLP 44 Ernst & Young 45 Target 46 MillerCoors 47 Kraft Foods 48 Fidelity Investments 49 UBS 50 Citi 51 Time Warner 52 Chevron Corporation 53 Diageo 54 Exxon Mobil Corporation 55 Anheuser-Busch InBev 56 FBI 57 Central Intelligence Agency 58 Harrah's Entertainment 59 Shell Oil Company 60 Marriott 61 Gap Inc. 62 Medtronic 63 Wells Fargo & Company 64 Yahoo! [read post]
6 Sep 2011, 6:37 pm by railroadaccidentfelalawyer
That is exactly what happened to our client, who worked for Illinois Central/Canadian National as a bridge repair worker. [read post]
22 Aug 2023, 1:53 pm by Katitza Rodriguez
Article 40(3) permits States to engage in a series of intrusive surveillance actions for one another, including real-time traffic data collection, content data interception, and actions related to “data” in a computer system, which includes searching, seizing, and disclosure. [read post]
25 May 2023, 5:31 am by Jack Hoover
The relevant portion of the text reads that “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. [read post]