Search for: "In Re Patch" Results 1421 - 1440 of 1,517
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
8 Jan 2018, 8:50 am by Andreas Kaltsounis
If you’re not incorporating a true risk assessment into your security program, 2018 is a good year to start. [read post]
9 Jul 2012, 8:37 pm by Chris Castle
Here’s the problem with the story we’re getting from Google: the word “inadvertently. [read post]
19 Apr 2010, 11:13 am by Finis Price
The 3G version comes with a large patch on the top, probably big enough to provide with good reception. [read post]
29 Apr 2016, 8:07 am by Nancy E. Halpern, DVM, Esq.
However, affected kittens may have patches of scaly skin with dandruff. [read post]
8 Nov 2022, 7:50 am by Catherine Reach
Older phones often cannot support updated mobile operating systems, and thus can’t be patched and adequately secured. [read post]
25 Apr 2019, 1:14 pm by Rachel Casper
The vetting process is very simple – just look at the subject line – you’ll know right way if this is a topic you’re interested in. [read post]
18 Feb 2009, 11:26 pm
Families who are going through a rough patch can kiss and make up or kiss and break up when they are working with us and it's only fair to say that this is the way forward - a couple who can understand one another's reasons without anger or angst in order to help the whole family build a new life - together or apart.6. [read post]
10 Sep 2012, 3:57 am by Prof. Akhil Reed Amar, guest-blogging
The stars are all in line: This month marks both the 225th birthday of the Constitution and the 150th re-birthday of the Constitution, thanks to the Emancipation Proclamation of September, 1862, which signaled the beginning of the end of American slavery. [read post]
24 Sep 2007, 12:26 am
It was against this backdrop that the BAP analyzed the question before it in the In re Brown & Cole Stores, LLC case. [read post]
28 Nov 2021, 4:34 pm by INFORRM
” The complaint alleges NSO Group’s FORCEDENTRY, “an exploit for a now-patched vulnerability,” was used to access users’ devices and install the Pegasus software, which Apple said was used to attack users “with dangerous malware and spyware. [read post]
14 May 2010, 9:02 am by INFORRM
Relying on the principles set out in Re S and therefore applying the ‘intense focus’ required by case law to the circumstances of the case, and addressing the issue of proportionality, the claimant was entitled to restrain the defendant’s acts of aerial harassment by injunction and the defendant’s surveillance of the claimant. [read post]
4 May 2010, 11:50 pm by Transplanted Lawyer
I have been absolutely swamped at work so it's been a little difficult to find time to analyze the Salazar v. [read post]
17 Jul 2015, 6:37 am by Simon Fodden
Rangel could see a small patch on his jaw where the razor had missed. [read post]
19 Oct 2011, 4:40 am by Rob Robinson
Marshals Service Invests In IT, Then Faces Cuts – http://bit.ly/p0esjG (John Foley) Twitter Hashtags of the Week #ACCAM11 #ARMA11 #eDiscovery #eDisclosure Vendor Views Industry Landscape 10 Questions for Wave Software CFO Walter Willey – http://bit.ly/r1wkBb (Nancy Weil) Beyond the Arc Taps Gnip to Fuel Social Media Data Mining – http://bit.ly/q0s6i3 (Business Wire) Cataphora Tackles Big Data Intelligence and Analytics With Executive Hire – http://bit.ly/pxkwqA… [read post]
11 Jun 2012, 1:09 pm by David Navetta
In our last “bring your own device” post we explored some of the key security, privacy and incident response issues related to BYOD. [read post]
16 Sep 2016, 6:18 am by Jim Sedor
Instead, he said the stories were composites patched together from events he had witnessed or heard about over the years. [read post]
3 May 2013, 7:44 am by Jamison Koehler
Guest Post by Mary Anne Brush We can all agree that smart kids sometimes do stupid things. [read post]
16 Jan 2014, 4:30 am by Guest Blogger
” It was mainly the Uniform Evidence Act with some re-organization and re-drafting. [read post]
14 Jan 2008, 5:04 pm
(Finally, my too-long review of Juno, which I wrote off and on for a week or so, mulling things over. [read post]
14 Mar 2024, 5:50 am by Harold Hongju Koh
These private allies used artificial intelligence to detect breaches of Ukraine’s cybernetwork and install corrective patches as endpoint protection. [read post]