Search for: "Technical Defense Associates Incorporated" Results 101 - 120 of 378
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 Oct 2023, 6:26 am
 Pix Credit here My Administration places the highest urgency on governing the development and use of AI safely and responsibly, and is therefore advancing a coordinated, Federal Government-wide approach to doing so. [read post]
18 Feb 2020, 12:34 pm by Elliot Setzer
Military Departments to discuss the state of their services, defense strategy, and key initiatives in the FY 2021 budget and associated future years defense program. [read post]
6 Nov 2014, 6:09 pm by Cynthia Marcotte Stamer
 plan administrators and other services providers,  and governments on health care, retirement, employment, insurance, and tax program design, administration, defense and policy. [read post]
24 Jan 2012, 6:49 pm
Those with some college or associate's degree represented 27.72%. [read post]
20 Aug 2020, 7:56 am by Paul Rosenzweig
The conception is a bit idealized, since it discounts the problems associated with the technical necessity for centralized monitoring of messages by technology companies. [read post]
In Part 1, we discussed the cybersecurity requirements applicable to federal contract information under Federal Acquisition Regulation 52.204-21(b) (1) and covered defense information (CDI) under Defense FAR Supplement 252.204-7012, which requires contractor compliance by December 31. [read post]
9 Mar 2020, 11:04 am by William Ford, Elliot Setzer
The committee will hear testimony from Kenneth Rapuano, the assistant defense secretary for homeland defense and global security; Adm. [read post]
19 Dec 2012, 8:46 am by Kathryn Fenderson Scott
However, the Court did not have a majority on which clause of the Fourteenth Amendment incorporates the fundamental right to keep and bear arms for the purpose of self-defense. [read post]
16 Dec 2009, 1:52 pm
 This, in my view, is a wrongheaded approach that is almost certain to strip away the protections for consumers embedded in the error cost approach incorporated into Section 2. [read post]
23 Dec 2013, 6:17 am
’ Under [Georgia Code § 16–1–3], which contains the definitions of certain words used in Title 16, and which has not been amended since 1982, a `person’ is `an individual, a public or private corporation, an incorporated association, government, government agency, partnership, or unincorporated association. [read post]
24 Feb 2020, 9:59 am by William Ford, Elliot Setzer
The subcommittee will hear testimony from John Rood, the outgoing undersecretary of defense for policy; Gen. [read post]
Department of Defense did not include the expanded norm in AP I prohibiting all forms of punishment for providing ethically sound medical care in IACs. [read post]
28 Aug 2017, 3:35 pm by jmalcolm
We have previously covered the privacy and surveillance risks associated with that scheme. [read post]
18 Jul 2018, 7:45 am by Rebecca Tushnet
ASTM has registrations for ASTM word marks and stylized ASTM logos, which they place on the cover pages of their technical standards. [read post]
14 Oct 2020, 9:09 am by Daniel Shaviro
Still less does it apply, for example, to, say, one's per capita share of the benefit (if any) derived from one's government's national defense spending. [read post]
13 May 2021, 7:06 am by Bryce Klehm
     (b)  Within 60 days of the date of this order, the Director of the Office of Management and Budget (OMB), in consultation with the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, and the Director of National Intelligence, shall review the Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement contract requirements and language for contracting with IT and OT service providers… [read post]
21 Jul 2015, 6:51 pm
Reed's affidavit, nor have they demonstrated any prejudice whatsoever resulting from the purported technical defect alleged by them. [read post]
3 Feb 2023, 5:01 am by Justin Sherman
Digital technologies can pose a variety of risks to U.S. security interests, including based on the technology product or service in question (from telecom equipment to mobile apps), its presence in or connection to the United States (from physical infrastructure to online ad entanglements), and the country of incorporation of its owner, among many others. [read post]