Search for: "Authentic Designs" Results 1061 - 1080 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Jan 2018, 5:44 am by David Canton
The problem is that far too often IOT device designers don’t design them with security in mind. [read post]
28 May 2015, 9:54 am by Rebecca Tushnet
(or designated alternate Stratasys witness): The output is very dependent on the material and authenticity, though the input is not. [read post]
21 Mar 2009, 2:41 pm
The authentication seems designed around the Martindale listing. [read post]
3 Oct 2020, 9:28 am by Eric Goldman
Additionally, Alexander’s expert addresses the importance of authenticity to drive sales and profits. [read post]
21 Oct 2013, 2:40 pm by HL Chronicle of Data Protection
  This will likely create uncertainty for organizations attempting to classify data during the design and implementation of security and privacy programs. [read post]
31 Aug 2020, 5:54 pm by Jean O'Grady
 They are the most important prerequisite in designing a digital library strategy. [read post]
1 Aug 2019, 10:23 am by Dennis Kennedy
It is usually handled by setting network permissions, designating user rights, and placing certain users into groups with defined roles. [read post]
8 Mar 2016, 10:39 am by Andrew Crocker
Second, many safety regulations might indirectly require companies to make certain design decisions in order to comply. [read post]
31 May 2019, 3:14 am by Jack Pringle
The Act requires that each Licensee “designate one or more employees, an affiliate, or an outside vendor designated to act on behalf of the Licensee who is responsible for the information security program. [read post]
2 Jan 2024, 6:23 am by Don Asher
  Unlike workers’ compensation claims, the plaintiffs here have to investigate for facts that can be introduced as authenticated and admissible evidence of every legal element of their claim. [read post]
12 Sep 2014, 7:00 am by Charles Shih
An SSL certificate is a protocol used to establish authentic encrypted connections. [read post]
19 Jan 2023, 10:03 am by Eric Goldman
Does the requirement of authenticate authors’ ages similarly constitute the monitoring of third-party content? [read post]
3 May 2021, 6:30 am by Bob Ambrogi
Print jobs are held in the professional’s Queue until an authorized user arrives at the printer and authenticates release. [read post]
13 Oct 2022, 2:13 pm by jeffreynewmanadmin
In addition, whistleblower insiders will likely have more access to information revealing fraud or reckless handling of client information.The audit-trail alternative is designed to provide broker-dealers with greater flexibility in configuring their electronic recordkeeping systems so they more closely align with current electronic recordkeeping practices while also protecting the authenticity and reliability of original records. [read post]
20 Feb 2008, 8:28 am
Numismatic Guaranty Corporation, concerning First Strikes designation. [read post]
24 May 2010, 4:55 pm by J. Alex Halderman
Because of these dangers, remote administration software should be designed defensively, minimizing the risk even if the authentication fails. [read post]
7 Jun 2012, 9:13 am by Lara
 Shawn’s company is an innovative design firm that helps its clients create brand experiences. [read post]