Search for: "Authentic Designs"
Results 101 - 120
of 2,935
Sorted by Relevance
|
Sort by Date
13 Sep 2007, 5:36 am
According to an article in www.landbigfish.com, one of the prime American outfitters, Hook & Tackle is best known for its nautical authentic outdoor and sport fishing apparel. [read post]
16 Jul 2020, 9:36 pm
An automated notification system, comprising: one or more transceivers designed to communicate data; one or more memories; one or more processors; and computer program code stored in the one or more memories and executed by the one or more processors, the computer program code comprising: code that enables a first party associated with a personal communication device (PCD) to input or select authentication information for use in connection with a... [read post]
10 Jul 2008, 4:19 pm
Planned topics:--Release 2007--Web OPAC/Front end design--Research Pro--User authentication issues--Acquisitions/Serials issues12:45-1:30: Open forum discussion.Sarah BolingChair, Innovative Law Users GroupSystems Services LibrarianSuffolk University Law School [read post]
26 Aug 2016, 12:03 pm
The title is designed to be used in conjunction with the RDA Toolkit, and feature links from the text directly to relevant instructions in the toolkit. [read post]
3 Dec 2023, 5:24 am
Pest Control will authenticate a Banksy already owned or will work with buyers and sellers to authenticate an item that is in the process of being sold.[30] As is Banksy’s way, the authentication is done in rather clever ways. [read post]
1 Apr 2021, 4:00 am
Fast Identity Online (FIDO) are standards designed to let you dump passwords as an authentication method. [read post]
16 Jul 2008, 3:19 am
Moderator Sarah Boling invited attendees to join one of six tables labeled with the subject of their choice, including Release 2007, Web OPAC/front end design, Research Pro, user authentication issues, acquisitions and ad hoc. [read post]
4 Mar 2021, 11:14 am
” We recognize, of course, that a purely decorative design may not qualify for trademark protection in the first place. . . . [read post]
16 Jul 2019, 3:51 pm
Sprinkled throughout are visual references to open wireless, two-factor authentication, our Surveillance Self-Defense website, and various other EFF projects. [read post]
4 May 2010, 3:00 am
” We all know her costumes are designed to create a fake image of her, yet many (including myself) still love her and her music. [read post]
27 Jun 2022, 11:08 am
Age-Appropriate Design Code. [read post]
6 Apr 2023, 2:00 pm
User Interface Design and Dark Patterns. [read post]
20 Aug 2024, 8:42 am
The California Age-Appropriate Design Code (AADC) is a “think of the kids” law that nominally purports to protect kids’ privacy. [read post]
17 Apr 2009, 3:14 am
Under the reply letter doctrine, the e-mail is authenticated. . . . [read post]
13 Sep 2021, 3:00 pm
The firms either did not require multi-factor authentication or failed to completely implement multi-factor authentication. [read post]
6 Nov 2019, 5:00 am
With more than 2 billion users, Facebook has been working to balance these core values of free speech and safety through our Community Standards—which aim to create a place for expression and give people voice with authenticity, safety, privacy and dignity. [read post]
6 Mar 2013, 12:11 pm
These awarded patents include three design patents and a few motion detection sensing systems that allow individuals to interact with devices without having to touch the device. [read post]
3 Dec 2008, 5:39 pm
An entity can designate one person or it can designate multiple people and specify the matters upon which each person will testify. [read post]
1 Feb 2012, 6:00 am
An authentic text is able to be authenticated, which means that the particular text in question can be validated, ensuring that it is what it claims to be. [read post]
18 Jun 2007, 8:52 am
Although a number of state online resources have been designated as "official," none are authenticated, or afford ready authentication by standard methods. [read post]