Search for: "Authentic Designs " Results 1561 - 1580 of 2,913
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 May 2017, 8:20 am by Charlotte Garden
A primary purpose of the Hague Service Convention is to require signatory states to designate a central authority that can handle cross-border service requests. [read post]
22 May 2017, 9:01 pm by Joanna L. Grossman
The acknowledgment requirement was designed to authenticate the signature and to impose on the signer “a measure of deliberation in the act of executing the document. [read post]
17 May 2017, 5:53 am
"From "Open, Non-Monogamous, Poly or Designer Relationships/What the NY Times Article Missed and What Therapists Need to Learn" by sex therapist Sari Cooper in Psychology Today. [read post]
15 May 2017, 6:13 pm by Dennis Crouch
Claim 1 merely recites the familiar concepts of receiving, authenticating, and publishing data. [read post]
So the President determines the system of designating classified information through Executive Order, and he is entitled to depart from it at well. [read post]
12 May 2017, 1:08 pm
It could be a desire for control, a fetishization of purity, a fantasy of authenticity, a need for something like religion, a solution to aimless anxiety. [read post]
9 May 2017, 11:43 am by Randal L. Gainer
The same Russian-based criminal group, designated by Mandiant as “Fin5,” was responsible for five of the 10 largest network intrusion attacks. [read post]
8 May 2017, 12:32 pm by erica
Some of the other modules include hardware-based authentication code and a system for location tracking and remote wiping of laptops for anti-theft purposes. [read post]
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
3 May 2017, 4:24 am by Jon Hyman
Consider Two-Factor Authentication: Consider requiring multi-factor authentication that requires additional information (i.e., an additional pass-code delivered to a designated secondary device) beyond a password to gain entry. [read post]
26 Apr 2017, 7:48 am by Clay Hodges
I can not and do not verify the authenticity of these documents, nor can I confirm the truth of the statements made in the documents. [read post]
25 Apr 2017, 10:52 am by James Yang
Stefik disclosed an authentication system designed to control access to digital works stored in a repository. [read post]
20 Apr 2017, 3:34 pm
Because of their flexible design and participant-driven method, scenarios are valuable in their ability to deliver high-energy discussions and consolidate viewpoints. [read post]
18 Apr 2017, 4:08 pm by James Yang
It was directed to a system and method for authenticating a webpage. [read post]
17 Apr 2017, 6:25 pm by Kelly Phillips Erb
Each Big Bagel Bundle includes a choice of any 13 bagels from among Bruegger’s Bagels’ authentic, New York-style bagel varieties, along with any two tubs of 100 percent made-in-Vermont cream cheese. [read post]
10 Apr 2017, 12:01 pm by Nathan D. Taylor and Adam Fleisher
” In a slight twist, the program must also be designed to fulfill applicable reporting obligations imposed by the Rule. [read post]
10 Apr 2017, 3:13 am by Lana Ulrich
” And as the Wall Street Journal notes, other reasons for excluding Iraq included that Iraqi travelers are relatively easy to authenticate because they must submit to biometric documentation to get passports. [read post]
 For example, the Controls suggest that outside counsel be required to maintain logical access controls designed to manage access to Company Confidential information and system functionality on a least privilege and need-to-know basis, including through the use of defined authority levels and job functions, unique IDs and passwords, [and] two-factor or stronger authentication for its employee remote access systems. [read post]