Search for: "Doe One: Unknown Identity" Results 861 - 880 of 1,179
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 Aug 2012, 11:01 am by oliver
However, the latter is identical to the ratio of functional groups as calculated on the basis of the amounts of starting materials employed. [read post]
17 Aug 2012, 9:45 am by Steve Hall
“What’s path-breaking about this paper is that it both isolates, as well as one can, the effects of biological testimony on outcomes and it also does this within a sample of the real-world decision makers, the judges themselves,” said Owen D. [read post]
8 Aug 2012, 8:17 am by Brian A. Hall
The fact that the flavor house was well known in the industry does not mean that the flavor house was well known in the industry for being Swanel’s flavor house. [read post]
4 Aug 2012, 12:01 am by tekEditor
The second category, including postal mail, telegrams, and the telephone, is a one-to-one medium; you could (as the technology of each matured) communicate with almost anybody in the world where such service was available, but your communications were person to person—point to point. [read post]
3 Aug 2012, 2:41 am by tekEditor
Unknown column” errors or bad data could result from changing the set of columns in a table used within a stored program between executions of the program or while the table was used within a program loop. [read post]
24 Jul 2012, 1:08 pm
It was just an identity theft sting aimed at stealing personal information. [read post]
3 Jul 2012, 11:53 am by Lyle Denniston
How does the CBS story deal with that part of the switch? [read post]
26 Jun 2012, 12:14 pm
The identities of the woman and the children have not been released to the pubic, and the children's' genders are likewise unknown. [read post]
2 Jun 2012, 12:12 pm by Abhik Majumdar
Moreover, it was in the nature of a "John Doe injunction", that is, it applied to any and all persons, even unknown ones. [read post]
18 May 2012, 3:48 am by Dan Harris
  The decision pertained to two joined cases—one case involved a shipment of electric shavers coming from China (with an unknown destination) that allegedly infringed on the design protection of a Philips product. [read post]
10 May 2012, 3:58 pm by Kim Zetter
The latest challenge occurred sometime around the end of January, when an unknown provider of communication services in the United States — possibly a phone company, or perhaps even Twitter — got a letter from the FBI demanding it turn over information on one, or possibly even hundreds, of its customers. [read post]
8 May 2012, 5:07 pm by INFORRM
  However, even if the bare fact of a relationship is not protected, the courts may nevertheless protect the identity of one of the parties from disclosure in the press to restrict media intrusion – see Goodwin v NGN (No.3) [2011] EWHC 1437. [read post]
7 May 2012, 2:38 pm by Paul Rosenzweig
” http://gcn.com/articles/2006/08/17/red-storm-rising.aspx Department of Education: August 2006 – Computers containing personal info of grant reviewers were stolen. http://www.idtheftcenter.org/artman2/uploads/1/ITRC_Breach_Report_20061231.pdf Department of Energy: Nuclear Security Administration – October 2011 – A DOE report disclosed that the department has been hit by recent successful cyber attacks.… [read post]
7 May 2012, 7:30 am by Medicare Set Aside Services
Unfortunately, no one wants to make that bill "more complicated" so that it does stand a chance of passing this term, leaving those of us with MSA issues out in the cold. [read post]
7 May 2012, 5:00 am by Bexis
  The ordinary constraint on design defect claims – that there be an alternative design – does not exist where the product is a chemical molecule, let alone one that would require FDA re-approval if it were changed in any way that affected its safety or efficacy. [read post]
3 May 2012, 1:02 pm by Venkat
The first scenario supports a CFAA violation, but the second does not. [read post]