Search for: "E B C I Inc" Results 141 - 160 of 1,924
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
6 Jan 2023, 11:15 am by Eric Goldman
Thus, “[b]ecause Section 230(c)(1) applies here, Twitter is not required to demonstrate good faith. [read post]
24 Oct 2018, 10:31 am by Eugene Volokh
Here's an excerpt from an e-mail from Arnstein mentioned in the criminal complaint: [N]o bullshit: if I could do it all over again I would have found another court order injunction for removal of links (probably something that can be found online pretty easily) made changes in photoshop to show the links that I wanted removed and then sent to 'removals@google.com' as a pdf - showing the court order docket number, the judges [sic] signature - but… [read post]
7 Sep 2011, 1:31 pm by K&L Gates
Morgan Stanley & Co, Inc., No. 08 Civ. 7508(SAS), 2011 WL 3738979 (S.D.N.Y. [read post]
2 Aug 2010, 9:41 pm by Michael Atkins
Here’s the claimed trade dress: “the shape, appearance, and location of (a) the blade holder, (b) the upper curve of the handle, (c) the bottom curve of the handle, (d) the upper notch in the handle, (e) the top rivets and pivot pins on the side wall of the handle, (f) the large pivot on the side wall of the handle, (g) the curved front and rear ends of the handle, (h) the handle as viewed from the rear, (i) the handle as viewed from the top, and (j)… [read post]
18 Jul 2013, 7:06 am by emagraken
Honda Canada Financial Inc.) the Plaintiff was involved in a 2009 rear end collision. [read post]
9 Feb 2011, 5:06 pm by Venkat Rangan
Demelis, No. 09-706-C, 2010 WL 3004337 (July 13, 2010) to essentially sample just a small number of backup tapes, at the expense of the requesting party. [read post]
3 Apr 2007, 1:22 am
Thus, Moore's notes that the "Second Circuit [c]autiously [p]ermits [r]elief [f]rom [l]egal [e]rror. [read post]
4 Nov 2010, 3:11 am by Falk Metzler
  Technical features: The proprietor (Beckman Coulter, Inc.) held that all steps A to E are technical, while the opponent (Roche Diagnostics GmbH) argued that steps B to E relate to pure mathematical operations and thus have to be considered non-technical. [read post]
7 Jun 2017, 4:00 am by Charles Bieneman
Claim 1 recites: A method for providing multi-level multimedia security in a data network, comprising the steps of: A) accessing an object-oriented key manager; B) selecting an object to encrypt; C) selecting a label for the object; D) selecting an encryption algorithm; E) encrypting the object according to the encryption algorithm: F) labelling the encrypted object: G) reading the object label; H) determining access authorization based on the object label; and… [read post]