Search for: "Instructional Systems v. Computer" Results 121 - 140 of 1,093
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Dec 2016, 11:04 am by Dennis Crouch
  The problem is that the claims require actions by both the computer system and also a patient/doctor. [read post]
20 Oct 2014, 4:30 am
  Essentially, the Bond covered “[l]oss resulting directly from a fraudulent . . . entry of Electronic Data or Computer Program into, or . . . change of Electronic Data or Computer Program within any Computer System operated by the insured, whether owned or leased”. [read post]
28 Sep 2009, 4:57 pm
Francis Pileggi offers a concise legal analysis of the Delaware Court of Chancery's decision in Wayne County Employees' Retirement System v. [read post]
13 Mar 2013, 5:27 am by Susan Brenner
In his second argument, Rad claimed that `the Government did not produce a single witness who claimed their protected computer was used without authorization’ and that the Government's expert `agreed that a system of controlled computers to send email in a legal fashion would operate identically and appear identical to a system using computers without authorization. [read post]
10 Jul 2013, 12:00 am
  The technology involves seeks in computer hard drives, and minimizing the vibrations created by those seeks—the ’635 patent discloses a method “for generating an input to a system to minimize unwanted dynamics in the system response and to reduce energy consumed by the system during moves,” and an apparatus for shaping commands to a system “to reduce endpoint vibration. [read post]
3 Feb 2010, 5:31 am
A neighbor’s wireless router failed, and her computer which regularly shared files, too, automatically picked up defendant’s system, and she saw folders indicative of child pornography. [read post]
8 May 2015, 5:21 am
TIC denied coverage based on the Policy's malicious-code and system-penetration exclusions. [read post]
30 Aug 2021, 3:08 pm by Corynne McSherry
But those interfaces don’t instruct the computer how it should perform those functions, for which WPL wrote its own code. [read post]
25 Apr 2012, 5:21 am by Susan Brenner
’ Access is defined as `to approach, instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer system, or computer network. [read post]
9 Feb 2010, 10:21 am by PaulKostro
It means “to instruct, communicate with, store data in, retrieve data from, or otherwise make use of any resources of a computer, computer storage medium, computer system, or computer network. [read post]
3 Nov 2016, 11:35 am
Thomas, 150 Wn.2d 821, 874–75, 83 P.3d 970 (2004).First degree computer trespass occurs when a person intentionally gains access without authorization to a computer system or electronic database of another and the access is made with the intent to commit another crime. [read post]
10 Jul 2012, 3:52 pm by Rantanen
  The patents included method, system, and computer program product claims. [read post]