Search for: "Trick Technologies, Inc" Results 121 - 140 of 180
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Jul 2007, 2:01 pm
Media Rights Technologies has turned up in the news again, this time asking the Library of Congress to pull the statutory music licenses belonging to AOL, ClearChannel, Yahoo, MSN, Rhapsody, and more. [read post]
8 Jun 2012, 1:30 am by Monique Altheim
Top stories today via @Symantec_DACH @prajnamu # Spammers Tap Into Fear Of Facebook's Frictionless Sharing – Spammers try to trick users into clicking on a link by t… http://t.co/C1CBdcJx # Recent Cases Focus Attention on the Video Privacy Protection Act http://t.co/XxQwpBUD # Hospital to Pay $750,000 to Settle Data Breach Charges Brought by Massachusetts AG http://t.co/fhBuughH # Employee of IT contractor sentenced to 57 months in prison for stealing info on law and… [read post]
14 Oct 2011, 1:03 am by Marie Louise
Google (Technology & Marketing Law Blog) Happy Halloween – Just in time for Halloween, a Seattle dispute over Screams.com domain name (Seattle Trademark Lawyer) [read post]
Varshneya has been featured as a business technology thought leader in numerous media channels, such as Bloomberg TV, Forbes, HuffPost, and Inc., among others. [read post]
1 Oct 2009, 2:14 am
Organon USA, Inc., 2007 WL 4365312 (D.N.J. [read post]
9 Feb 2015, 6:50 am by Lax & Neville LLP
” On December 16, 2014, the SEC suspended trading of a Las Vegas, Nevada company called American Heritage International, Inc. [read post]
10 May 2012, 5:20 am
On 2 May last, the CJEU published its decision in Case C-406/10 SAS Institute Inc v World Programming Ltd. [read post]
22 Apr 2012, 7:18 am by Dan Harris
(AAPL) and Proview Technology (Shenzhen) Co. in a bid to get the companies to settle their dispute over the iPad trademark in the country. [read post]
Black Horse Carriers, Inc., 2021 IL App (1st) 200563, addressed the question of statute of limitations for BIPA claims. [read post]
8 Dec 2023, 10:02 am by Cynthia Marcotte Stamer
  Phishing is a type of cybersecurity attack used to trick individuals into disclosing sensitive information via electronic communication, such as email, by impersonating a trustworthy source. [read post]
8 Oct 2012, 1:43 pm by Glenn
Google, Inc. is that the firms pushing for a prosecution can only contend that Google’s search algorithms unfairly demote result rankings for so-called “vertical” competitors. [read post]