Search for: "Authentic Designs" Results 821 - 840 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Jun 2018, 8:00 am by Katie Lundin, crowdspring
Katie Lundin is with crowdspring, one of the world’s leading marketplaces for crowdsourced logo design, web design, graphic design, product design, and company naming services. [read post]
28 Jun 2018, 8:00 am by Katie Lundin, crowdspring
Katie Lundin is with crowdspring, one of the world’s leading marketplaces for crowdsourced logo design, web design, graphic design, product design, and company naming services. [read post]
4 Oct 2022, 12:51 am by Giorgio Luceri
Although these integrated solutions are not yet available to LEAs, some companies are developing ACR-based authentication solutions for smartphones with applications to capture an image of a product to be authenticated. [read post]
17 Oct 2023, 4:53 am by Rob Robinson
Workflows are designed by HaystackID’s experts during onboarding to best fit each client’s needs. [read post]
19 Dec 2016, 9:39 am by Andrew McClure
  The link was designed to function as a confidence-building measure and should not be confused with the White House-Kremlin Direct Communication line, or secure hotline, used to manage crisis situations. [read post]
10 Jan 2013, 7:03 am by Rebecca Tushnet
  (Bonus question: how good was Building #19's designing around the injunction?) [read post]
8 Mar 2015, 9:02 am by Kenneth Vercammen Esq. Edison
 Uniform Probate CodeSubject to additional definitions contained in the subsequent [articles] that are applicable to specific [articles,] [parts,] or sections and unless the context otherwise requires, in this [code]: (1) “Agent” includes an attorney-in-fact under a durable or nondurable power of attorney, an individual authorized to make decisions concerning another’s health care, and an individual authorized to make decisions for another under a natural death act. (2)… [read post]
5 Aug 2021, 2:37 pm by Rebecca Tushnet
We don’t care about authenticity of an air conditioner manual, but it's still in ©. [read post]
7 Sep 2009, 6:55 am by Venkat
  Here's a previous post I did on email authentication at the summary judgment stage that discusses email authentication at length. [read post]
5 Oct 2007, 12:10 pm
"They send out one million e-mails to people designed to encourage impulsive behavior. [read post]
17 Jun 2011, 11:46 am by David Kravets
The 1998 DMCA makes it a crime or civil violation to offer a product or service that circumvents a technological measure designed to protect copyrighted material. [read post]
13 Feb 2022, 12:08 pm by Nicholas J. Krob
The associated product is subject to StockX’s own authentication process. [read post]
14 Oct 2018, 9:03 pm by Joe Whitworth
The 19 recommendations are designed to prioritize food safety and improve industry standards in the meat supply chain. [read post]
5 May 2022, 10:05 pm by Jeff Richardson
  And now, the news of note from the past week: Illinois attorney John Voorhees of MacStories reviews The iOS App Icon Book, a book showcasing great app icon designs. [read post]
Third-party service provider risk management program Under the final phase of the two-year transitional period, covered entities must implement written policies and procedures designed to ensure the security of information systems and non-public information from risk posed by third-party service providers. [read post]
5 Jun 2019, 9:04 pm by News Desk
“These help to ensure that the food we produce is safe, authentic and traceable. [read post]
13 Mar 2012, 1:13 pm by Craig Hoffman
  And following the new multi-factor authentication guidelines is not a guarantee of security. [read post]