Search for: "Conversational Computing Corporation," Results 121 - 140 of 1,110
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Feb 2012, 4:00 am
Instead of giving actual employees discretion in claims based on the reality of the situation, claims are now completely computer-driven. [read post]
21 May 2014, 5:37 pm by Stuart Kaplow
District Court Eastern District of Michigan, claiming the object of the Chinese state owned companies’ illegal dumping actions was to drive established solar industry leader, Energy Conversion Devices, out of business. [read post]
10 Jun 2015, 12:17 pm by Rebecca Tushnet
 Giles first alleged that certain defendants violated the CFAA by obtaining Giles Construction’s proprietary information on ATI computers and then divulging that information to competitors in violation of ATI’s corporate guidelines. [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
Ransomware is a type of malicious software that infects a computer and restricts users’ access to certain data, systems and/or files until a ransom is paid. [read post]
20 Apr 2009, 7:13 am
In a February 19th order, Judge Ron Clark criticized Johnson's failure to compute the cost estimate with precision and called Johnson's figures "somewhat inflated," noting that "a simple internet search reveals multiple software programs available for OCR conversion at costs ranging from about $200 to $600. [read post]
17 Aug 2011, 10:40 pm by Lawrence B. Ebert
As discussed above, the Supreme Court found in Benson that a claim to a method of programming a general-purpose computer to convert BCD numbers into pure binary was unpatentable because the conversion of BCD numerals to pure binary numerals “can be done mentally,” 409 U.S. at 65–67, and because the process was “so abstract and sweeping as to cover both known and unknown uses of the BCD to pure binary conversion,” id. at 71. [read post]
5 Feb 2019, 1:13 pm by Nathan Matias
In a time when U.S. tech employees are organizing against corporate-military collaborations on AI, how can the ethics and incentives of military, corporate, and academic research be more closely aligned on AI and lethal autonomous weapons? [read post]
13 Jan 2011, 10:38 am by M. Scott Koller
The very first email message was sent in 1971 by a computer engineer named Ray Tomlinson. [read post]
13 Jan 2011, 10:38 am by Scott Koller
The very first email message was sent in 1971 by a computer engineer named Ray Tomlinson. [read post]
8 Aug 2013, 6:53 am
Paragraph 1 says he ends conversations that go on too long. [read post]
30 Oct 2014, 9:05 am by Anthony Orler
Cell phones can take pictures, record conversations, and send data anywhere in the world. [read post]
23 May 2014, 5:05 am by Adam Weinstein
HCM purportedly bought and sold exchange traded funds based on a proprietary trading strategy implemented by a computer program. [read post]
10 Jan 2018, 2:07 am by Sanjana
” Our conversation focussed a lot on the role and relevance of technology in (peace) negotiations spanning social media networks, how first interpretations of official processes are now made, remade, contested, contrasted, accepted and rejected, in close to real time, online, how instant messaging conversations go totally under the radar of the usual media monitoring (that informs an official process), the role of corporate entities and how 18-34 year olds, in… [read post]
15 Mar 2011, 12:08 pm by Jerry Brito
But if we want to shift the popular culture, we need a broader flow of information to corporations and individuals to educate them on the threat. [read post]
29 Jul 2020, 4:00 am by Sharon D. Nelson and John W. Simek
Make sure your confidential client conversations are kept private. [read post]