Search for: "Authentic Designs" Results 1561 - 1580 of 2,918
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
1 Jun 2010, 1:28 pm by Kim Zetter
Or is it a clever smear by US intelligence, designed to discredit the Union, fracture Somali alliances and manipulate China? [read post]
12 Dec 2010, 10:00 pm by Rosalind English
 And here they are: EU law is a self-authenticating form of higher law. [read post]
”  The Executive Order, however, did specifically exclude the following from the definition: (i)         demographic or contact data that is linked only to another piece of demographic or contact data (such as first and last name, birth date, birthplace, zip code, residential street or postal address, phone number, and email address and similar public account identifiers); or (ii)        a network-based identifier,… [read post]
  Although Rosenbach is not a standing case, it is possible that other courts may embrace its view that “real and significant” injury occurs when statutory requirements designed to protect privacy are not followed. [read post]
22 Jan 2011, 4:52 pm by admin
The FCC didn’t think it was appropriate to banish the “authentication” business model. [read post]
At Progress, we have many initiatives designed to encourage and empower women. [read post]
From that standpoint, I would say that we’ve come a long way in embracing authentic human interactions. [read post]
28 Oct 2011, 12:51 pm by Kim Zetter
Beresford contacted ICS-CERT about the vulnerabilities so that the agency could work with Siemens to verify their authenticity and fix the problems before he publicly disclosed them. [read post]
24 May 2010, 4:58 am
"  Authentic but nonetheless wrong in its zeal to oversimplify. [read post]
7 Mar 2011, 12:13 pm by Betsy McKenzie
A major question is why so few faculty members use these "authentic" approaches. [read post]
., policies on clear desks and screens, passwords and other forms of authentication, safe email and web usage, and secure remote working practices). [read post]
2 Jan 2013, 7:44 am by aallwash
This year’s program is designed to be very interactive – with breakout discussions on three separate policy issues for the upcoming year. [read post]
  Although Rosenbach is not a standing case, it is possible that other courts may embrace its view that “real and significant” injury occurs when statutory requirements designed to protect privacy are not followed. [read post]
29 Mar 2015, 12:02 am by Sanjana
We also hardened security over key social media accounts by enabling two-step authentication, minimising the risk of unauthorised access and hacking attempts. [read post]
4 Jul 2021, 6:43 am by Russell Knight
Courts look with favor upon stipulations which are designed to simplify, shorten or settle litigation and save the costs of the parties. [read post]
11 Jul 2023, 4:00 am by Judith Gaskell
Historical bill and document texts predate authenticated digital publishing. [read post]
21 Sep 2022, 1:55 pm by James J. Scherer
Notaries performing RON will be required to employ multi-factor authentication methods to confirm the signor’s identity, such as knowledge-based authentication and credential analysis. [read post]
16 Jul 2021, 7:46 am by Eric Goldman
The Court thus finds that Younis’s Affidavit sufficiently authenticates the Terms of Use Acceptance Logs. * Kauders v. [read post]