Search for: "DESIGNATION AND SENTENCE COMPUTATION CENTER" Results 61 - 80 of 261
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Mar 2020, 9:05 pm by Sophie Davis
In their article, Mulligan and Bamberger provide the example of Wisconsin’s use of computer software to predict the likelihood of an individual engaging in future criminal activity at criminal sentencing. [read post]
28 Feb 2020, 3:00 am by Jim Sedor
‘Scam PAC’ Treasurer Sentenced to Federal Prison Center for Public Integrity – Sarah Kleiner | Published: 2/21/2020 A federal judge sentenced political operative Scott Mackenzie to 12 months and one day in prison for making [read post]
14 Feb 2020, 3:00 am by Jim Sedor
Political App Faces Legal Challenge Over Donation Reveals Forbes – John Scott Lewinski | Published: 2/11/2020 An app and web service designed to peer inside the world of corporate campaign finance is catching the ire of companies who would rather not share such information publicly. [read post]
27 Dec 2019, 7:55 am
Aspirational pledges have no binding effect, but the pledge itself is worth more -- the pledge involves the public cult worship of the object of aspiration, and increases the worship of thew worshiper; aspirational 'ledges, then, are at the center of the cult of the self. [read post]
26 Dec 2019, 5:00 am by Eric Halliday
Yakubets and Turashev allegedly distributed several versions of “Bugat” malware, a sophisticated keystroke logging program designed to capture personal information—like online banking credentials—from infected computers. [read post]
29 Nov 2019, 11:03 am by Michael Lowe
Specifically, calculations are made at the BOP’s Designation and Sentence Computation Center (DSCC) located in Grand Prairie, Texas. [read post]
5 Nov 2019, 3:25 pm by Cynthia Marcotte Stamer
  Take the sentencing of Gail Cooper, who was sentenced for the employment tax crimes she committed as owner of a commercial and residential glass installation company, Greenville Architectural Glass (GAG). [read post]
24 Oct 2019, 9:33 am by Rebecca Crootof
” When OpenAI first unveiled the program in February, it was capable of impressive feats: Given a two-sentence prompt about unicorns living in the Andes Mountains, for example, the program produced a coherent nine-paragraph news article. [read post]
18 Sep 2019, 9:52 pm by Kevin LaCroix
 “Malware” is oft defined as software designed to interfere with a computer’s normal functioning, such as viruses (which can wreak havoc on a system by deleting files or directory information); spyware (which can secretly gather data from a user’s system); worms (which can replicate themselves and spread to other computers); or Trojan horses (which upon execution, can cause loss or theft of data and system harm). [read post]
13 Sep 2019, 1:19 pm by Jason Kelley
EFF’s annual Pioneer Awards ceremony celebrates individuals and groups who have made outstanding contributions to freedom and innovation on the electronic frontier. [read post]
16 Aug 2019, 3:00 am by Jim Sedor
National/Federal At Def Con, Hackers and Lawmakers Came Together to Examine Holes in Election Security Seattle Times – Taylor Telford (Washington Post) | Published: 8/12/2019 Hackers came had come to the DefCon computer security conference for a chance to probe voting machines used in U.S. elections. [read post]
9 Aug 2019, 3:00 am by Jim Sedor
” In sentencing Cesar Sayoc to 20 years in prison, a federal judge emphasized the need to look closely at both the crimes and their perpetrator. [read post]
23 Jul 2019, 4:30 pm by Kevin LaCroix
John Reed Stark In the following guest post, John Reed Stark takes a closer look at President Donald Trump’s recent Twitter tirade against cryptocurrency and lays out a roadmap for the President to follow if his administration were to crack down on cryptocurrency. [read post]
9 Jul 2019, 2:00 am by HR Daily Advisor Editorial Staff
I’m pleased to introduce Lisa Rueth, the senior partner and CEO of Cultivate Leadership, a consulting firm that is dedicated to leadership science, organizational design, and executive coaching. [read post]
2 Jun 2019, 11:27 pm by Chuck Cosson
  It will require designers and users to, to the extent possible, acquire greater understanding of themselves as sorters and interpreters of information[27]. [read post]
29 May 2019, 5:06 pm by Kevin LaCroix
While ransomware attacks come in many forms, in each case they infect a computer and restrict users’ access to certain data, systems, and files, until a ransom is paid. [read post]
23 May 2019, 1:07 pm by Jamie Markham
Civil World/SKILLS—a set of computer-based training modules that teach life skills. [read post]
25 Mar 2019, 6:11 am by Scarlet Kim, Paulina Perlin
In July 2017, Privacy International and Yale Law School’s Media Freedom & Information Access Clinic (MFIA) filed a lawsuit against the National Security Agency, the Office of the Director of National Intelligence (ODNI), the State Department, and the National Archives and Records Administration seeking access to records related to the Five Eyes alliance under the Freedom of Information Act. [read post]
25 Jan 2019, 2:28 pm by Michael Lowe
Good time calculations for all prisoners in prisons run by the federal government (Bureau of Prisons) are handled out of Grand Prairie, Texas, at the federal Designation and Sentencing Computation Center. [read post]