Search for: "Instructional Systems v. Computer" Results 141 - 160 of 1,093
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Jun 2015, 9:06 am by Woodrow Pollack
Although the first step of the method requires “generating a rule for monitoring audit log data,” Claim 1 neither states a rule nor instructs a computer to generate a rule. [read post]
4 Mar 2013, 5:18 am by Susan Brenner
’ “’Financial instruments associated with computers” include, but are not limited to, checks, drafts, warrants, money orders, notes of indebtedness, certificates of deposit, letters of credit, bills of credit or debit cards, financial transaction authorization mechanisms, marketable securities, or any computer system representations of any of them. [read post]
23 Nov 2015, 9:27 am by Ruth Levush
Computer programmers, manufacturers and military commanders, therefore, could all escape liability for unlawful harm caused by LAWS. [read post]
4 Jul 2016, 2:10 pm
In fact, a source code is a set of instructions written in programming language which a computer translates into object code and executes (see Microsoft Corp v. [read post]
5 Dec 2010, 4:27 pm by Kenneth S. Nankin
Introduction to the Act In the early 1980s, computer hackers began to penetrate government and private computer systems. [read post]
23 Apr 2013, 8:47 am by Lawrence B. Ebert
Final Rej. 6.However, claim 30 is very clearly drawn to a computer system comprising aCPU, a computer readable storage media, and program instructions. [read post]
23 Nov 2020, 6:19 am by Andrew Appel
Regulation of Dealer-Management Systems Regarding the underlying case, CDK Global v. [read post]
29 Jul 2014, 8:28 am by Gene Quinn
The limitations are merely instructions to implement the abstract idea on a computer and require no more than a generic computer to perform generic computer functions that are well-understood, routine and conventional activities previously known to the industry. [read post]
28 May 2006, 10:11 pm
The underlying facts involved Microsoft supplying master versions of its Windows Operating System to foreign computer manufacturers and authorizing foreign "replicators" to make copies of the master for installation on foreign computers. [read post]
13 Dec 2014, 9:36 pm
“[I]f a patent’s recitation of a computer amounts to a mere instruction to ‘implemen[t]’ an abstract idea ‘on . . . a computer,’ . . . that addition cannot impart patent eligibility. [read post]
14 Dec 2014, 7:16 am
The main question at issue is whether Google infringed Oracle’s patents and copyrights by copying Oracle-owned Java APIs in Android (Google’s mobile operating system) without authorization. [read post]
28 May 2014, 5:36 am
  In a footnote, the judge points out that the prosecution “neither suggested nor presented evidence indicating that Katakis scrubbed, or destroyed, the operating systems of the computers or mail server. [read post]
11 May 2011, 12:13 am by johntfloyd
Extended Border Search Doctrine: Suspicionless Searches of Computers and Cameras Need not be Conducted at Time and Place of Entry By: Houston Criminal Lawyer John Floyd and Paralegal Billy Sinclair It was a case of “first impression” for the Ninth Circuit Court of Appeals—the case of United States v. [read post]