Search for: "Root User" Results 61 - 80 of 1,705
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Jun 2011, 6:22 am by Todd Rodriguez
PODs are typically companies organized by individuals, some or all of whom are physicians who utilize medical devices, to purchase and resell medical devices to end users such as hospitals and surgery centers. [read post]
12 Mar 2022, 4:14 pm by INFORRM
These include: Impartial or neutral strategies mean the companies do not take a particular side during incidents, but provide further information on the topic at the root of the hostility. [read post]
17 Nov 2011, 3:41 am by meritxell_fernandez
In IdeaScale, users are asked to check whether their idea has already been covered by other users, and alternatively to add a new idea. [read post]
7 Dec 2020, 6:16 am by Michael Froomkin
Kazakhstan users have told ZDNet today that they are not able to access sites like Google, Twitter, YouTube, Facebook, Instagram, and Netflix without installing the government’s root certificate. [read post]
24 Jul 2012, 3:01 am by tekEditor
Additionally, as used herein, a "user" may be an individual, a group, or an entity (such as a business or third party application). [read post]
2 Jan 2018, 9:10 am
The Interplay Between User Innovation, the Patent System and Product Liability Laws: Policy ImplicationsStijepko Tokic, J.D., LL.M.Innovation is a heavily used buzzword in the United States of America, and the fixation with innovation has deep roots in American society. [read post]
30 Aug 2023, 5:01 am by Nicholas Nugent
Put differently, deplatforming expands the scope of concern beyond the particular website in which a user might express a disfavored opinion to encompass the user's words or actions on any website or even to the user's offline words and actions. [read post]
24 Nov 2020, 6:54 am by rainey Reitman
So, this episode has its roots in a long and ongoing discussion that we have at EFF about competition in tech, or rather, the complete lack of it these days. [read post]
21 Apr 2010, 12:27 pm
Pagers were at the root of this week's Ontario v. [read post]
28 May 2014, 12:11 pm by Dan Goodin
" The advisory warned that critical weaknesses in the software expose users to attacks that compromise investigations and the security of the agency networks. [read post]
17 Sep 2009, 4:50 am
As with the sophisticated user defense, the bulk supplier notion is rooted in Restatement § 388 comment n. [read post]
10 Dec 2015, 2:13 pm by Bill Budington and Eva Galperin
Because of this, it is difficult for ordinary attackers to pull off a Man in the Middle attack successfully on encrypted Internet connections—they have to both be situated in a privileged position within the network (between the user and the remote server), and in possession of a certificate signed by a root for the server being accessed. [read post]
22 Feb 2019, 10:30 am by Cooper Quintin
DarkMatter’s business objectives directly depend on intercepting end-user traffic on behalf of snooping governments. [read post]
14 May 2018, 8:32 am
Who's responsible for making this video available: (a) the user-uploader(b) YouTube(c) both of them(d) Merpel(e) no oneCan YouTube be considered primarily responsible (and, therefore, potentially liable) for the making available of user-uploaded content through its platform? [read post]
3 Mar 2021, 12:10 pm by Gerson & Schwartz, P.A.
When they do not comply with regulations aimed at keeping people safe, drivers put other road users at risk. [read post]
26 Oct 2020, 4:41 pm by Corynne McSherry
Platforms must address one of the root causes behind disinformation’s spread online: the algorithms that decide what content users see and when. [read post]
16 May 2025, 9:01 am by Ashley Belanger
And on top of allegedly showing no evidence of "ad load, privacy, integrity, and features" degradation on Meta apps, Meta argued there's no precedent for an antitrust claim rooted in this alleged harm.Read full article Comments [read post]
20 Feb 2015, 1:20 pm by Dan Goodin
Instead, it attacks an argument that no one has made—that Superfish somehow shares personal information without users' permission. [read post]
25 Nov 2015, 10:56 am by Cooper Quintin
The same certificate appears to be installed in every affected Dell machine, which would enable an attacker to compromise every affected Dell user if only they had the private key which Dell used to create the certificate. [read post]