Search for: "Authentic Designs"
Results 1101 - 1120
of 2,918
Sorted by Relevance
|
Sort by Date
20 May 2010, 2:09 pm
The primary issue in the Lower Merion case is the optional Theft Track feature in the software designed to let administrators covertly snap images through the computers’ webcams. [read post]
15 Aug 2022, 2:04 am
This is a crucial part of the structure because it ensures an authentic line of communication. [read post]
25 Jun 2010, 6:28 am
The UECA was designed for these rules to be informal, so long as they are communicated to the people who need to know about them. [read post]
25 Jun 2024, 9:39 am
Anti-counterfeiting laws are designed to combat the production, distribution, and sale of fake products that mimic genuine brands, ranging from luxury goods and electronics to pharmaceuticals and automotive parts. [read post]
3 Oct 2018, 5:58 pm
The bill specifies that one way a manufacturer can meet this reasonableness standard for a device equipped with a means for authentication outside a local area network is to include a preprogrammed password unique to each device or to include a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time. [read post]
20 May 2024, 9:01 pm
Oil authenticity and Easter checksIn other work, ASAE’s southern regional unit helped to check the authenticity and quality of olive oil sold in Portalegre, Beja, and Silves. [read post]
8 Apr 2023, 5:50 am
These resources offer pre-designed contract structures and provisions that can be customized to fit specific needs. [read post]
16 Sep 2015, 2:10 pm
It may also review how a firm verifies authenticity of client requests to transfer funds. [read post]
1 Apr 2016, 5:54 pm
Second, part of making sure a letter is reliable is confirming not only that it is authentic, but that the author is qualified to make the diagnosis of disability. [read post]
21 Sep 2016, 1:44 pm
The contractor is responsible for inspecting, testing, and authenticating the parts. [read post]
9 May 2017, 11:43 am
The same Russian-based criminal group, designated by Mandiant as “Fin5,” was responsible for five of the 10 largest network intrusion attacks. [read post]
17 Mar 2011, 1:00 pm
How authentic can these shows be when producers design challenges for the participants and then editors alter filmed scenes? [read post]
16 Dec 2010, 7:53 am
These include things like: Issuance of shares: section 23(1) Meetings by electronic means: section 94(2) Quorum at a shareholder meeting: section 101(1) Manner of voting at shareholder meetings: section 103(1) Calling of shareholder meeting: section 105(5) Making, amending, or repealing the by-laws of the corporation that regulate the business and affairs of the corporation: section 116 The location of a meeting of the board of directors: section 126(2) Quorum at a director meeting: section… [read post]
1 May 2020, 11:24 am
AI company Tangent.ai is seeking to capitalize on this with an algorithm designed to help consumers determine what products will look like on them. [read post]
9 Feb 2015, 4:00 am
’s knowledge-based authentication as a new verifiable parental consent method and in 2014, the Commission approved iVeriFly, Inc. [read post]
26 Dec 2006, 12:09 pm
Because TrueView Vignettes are unscripted, they bring out a lawyer's authentic voice. [read post]
3 Sep 2013, 10:19 am
Some sellers have even included the serial number found at the bottom of each e-meter in their listings in order to authenticate them. [read post]
20 Jul 2008, 4:46 pm
Identity management and network authentication 10 + 2. [read post]
Maryland Plaintiffs Seek to Uphold 6.5 Million Dollar Jury Verdict in Personal Injury Case on Appeal
26 Nov 2018, 2:45 pm
However, the plaintiffs did not introduce any evidence to authenticate the images, or show that they depicted what the plaintiffs claimed. [read post]
23 Mar 2021, 12:00 am
More recently, biometric authentication has complicated these issues. [read post]