Search for: "Authentic Designs" Results 861 - 880 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 Oct 2018, 1:29 pm by Law Offices of Robert Dixon
Design defects impact the entire product line because there is a flaw in the product’s inherent design or specification. [read post]
3 May 2024, 11:18 am by Yosi Yahoudai
(Courtesy of Disney) Paseo and Centrico seek to maintain an authentic Mexican look and feel amid vacationing tourists streaming through Downtown Disney. [read post]
21 Nov 2022, 9:01 pm by News Desk
” Supported by the Welsh Government, ZERO2FIVE works with food and drink companies of all sizes to provide support with factory design, start-up advice, new product development, hygienic design, third-party certification, and global food standards compliance, food safety, authenticity and security, food and labeling legislation and market analysis. [read post]
3 May 2024, 11:18 am by Yosi Yahoudai
(Courtesy of Disney) Paseo and Centrico seek to maintain an authentic Mexican look and feel amid vacationing tourists streaming through Downtown Disney. [read post]
15 Oct 2021, 8:04 am by Odia Kagan
Single Sign-On (SSO): allow connections to a large number of sites, applications or services via a single user account and a single authentication. [read post]
28 Apr 2016, 8:18 am by Ezra Rosser
Through these examples the authors expose an inherent problem in the design of the SRP that they remedy with a statutory amendment. [read post]
4 Nov 2013, 9:46 am by Jane Chong
 But legal academics have spent thirty years disagreeing with that proposition and dreaming up liability schemes designed to force software vendors to shoulder some of the costs long borne entirely by users. [read post]
8 Jul 2022, 9:23 am by Eric Goldman
Regarding the plaintiff’s negligent design theory, which got around Section 230 in Lemmon, the court says (with citations to the Texas Supreme Court ruling in In re Facebook): The crux of Doe’s negligent design claim, like his negligent undertaking and gross negligent claims, is that Snapchat designed its product with features that allegedly created the opportunity for Guess-Mazock to send illicit messages to Doe. [read post]
In addition, it can’t delay job restoration while it seeks clarification and/or authentication. [read post]
12 Mar 2010, 11:26 am by Sheppard Mullin
 Heretofore, exporters have done well to consider first whether an encryption function is limited to password protection or user authentication. [read post]
5 Nov 2018, 4:20 pm by Peter Stockburger
Code § 1798.91.04(a)(2)-(3)) The phrase “security feature” is defined as a “feature of a device designed to provide security for that device. [read post]
27 Feb 2017, 5:00 am by Aaron M. Oser and Andrew L. Caplan
Unlike prevailing cybersecurity regulations, which tend to be technology-agnostic, the regulations will require Covered Entities to adopt certain specified controls including multi-factor authentication systems and encryption technologies (or suitable alternatives) in specified circumstances. [read post]
30 Sep 2015, 6:31 am by Jeff Welty
Effective immediately, the bill allows chief district court judges to designate magistrates to appoint counsel and to accept waivers of counsel. [read post]
27 Jul 2010, 1:58 pm by Jeff Vail
  --- Deposition and other preserved testimony: see checklist on designation and objection to preserved testimony. [read post]
27 Feb 2017, 5:00 am by Aaron M. Oser and Andrew L. Caplan
Unlike prevailing cybersecurity regulations, which tend to be technology-agnostic, the regulations will require Covered Entities to adopt certain specified controls including multi-factor authentication systems and encryption technologies (or suitable alternatives) in specified circumstances. [read post]
30 Sep 2015, 6:31 am by Jeff Welty
Effective immediately, the bill allows chief district court judges to designate magistrates to appoint counsel and to accept waivers of counsel. [read post]
23 Jun 2015, 10:35 am by Alexander Major
IDENTIFICATION AND AUTHENTICATION: Identify information system users and authenticate (or verify) the identities of those users as a prerequisite to allowing access. [read post]
The EU Parliament text defines “foundation models” as AI models that are “trained on broad data at scale, … designed for generality of output, and can be adapted to a wide range of distinctive tasks”. [read post]