Search for: "Authentic Designs" Results 1661 - 1680 of 2,935
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Oct 2016, 10:06 am by Michael Price
One prominent approach is the use of “digital evidence bags” that allow investigators to safely search and acquire data on-site, together with any relevant metadata, and package it using digital keys designed to assure the data’s provenance for authentication and use at trial. [read post]
3 Oct 2016, 4:00 am by Pierre-Paul Lemyre
Our Zoupio product, initially designed to improve access to professional and technical documentation (larger works and commentaries, for example), packages some of the same technologies (file converter, search engine, highlighter, etc) and embeds them within any website while enabling authenticated users to add a private layer of knowledge on top of the original documents. [read post]
2 Oct 2016, 5:00 am by Barry Sookman
https://t.co/7hdOoGDZjr -> Jared Leto Loses Lawsuit Over TMZ's Taylor Swift Diss Video https://t.co/qgasiSiT5T -> Olympic stadium T-shirt violates copyright law, Montreal designer told https://t.co/ziXY39JoqF -> New global consumer research by IFPI includes Canadian figures https://t.co/gBOcOK4rzz -> REDUCING RISKS: Court Finds Copyright Act Does Not Preempt State Trade Secret Claim https://t.co/P5OEvNmr8F -> ABC And Yahoo Sued By Father Who Streamed Baby's Birth… [read post]
The agricultural lien provisions were designed to further crop and livestock production by encouraging those who are not credit professionals to provide goods and services and lease real property to farmers. [read post]
23 Sep 2016, 8:54 am by Jeff Kern and Christopher Bosch
  Covered Entities will also have to implement authentication procedures for access to information systems and nonpublic information, and audit trail systems that track and maintain, for six years, financial transaction, accounting, and system access data. [read post]
22 Sep 2016, 9:44 am by Jeff Kern
  Covered Entities will also have to implement authentication procedures for access to information systems and nonpublic information, and audit trail systems that track and maintain, for six years, financial transaction, accounting, and system access data. [read post]
21 Sep 2016, 12:57 pm by Howard Knopf
However, the illustrator, the preface writer, or the designer of the cover of a modern edition of a public domain work is certainly not a joint author of the underlying work. [read post]
20 Sep 2016, 6:00 am by Andrew Appel
Voting machines designed in the 1990s and 2000s took advantage of a new nonvolatile storage technology that we now take for granted:  flash memory. [read post]
19 Sep 2016, 11:24 am by Marcel Bucsescu, Matthew Waxman
The proposed rule goes on to identify other practices that the NYSDFS deemed important, from encryption and multi-factor authentication techniques to data retention practices and training and employee monitoring. [read post]
13 Sep 2016, 3:15 am by Steve Brachmann
The innovative system is designed for both simplicity of use as well as security and authentication in online financial transactions. [read post]
9 Sep 2016, 11:14 am by Mark Parsons and Louise Crawford
Examples include the need for privacy in the physical design of office space, the ability to restore personal information in the event of an interruption, and encryption of personal information during storage, while in transit and during the authentication process. [read post]
6 Sep 2016, 2:42 pm by Larry Tolchinsky
And it referenced B of A as being the successor to LaSalle Bank, with the same name designation in the complaint. [read post]
26 Aug 2016, 12:03 pm
The title is designed to be used in conjunction with the RDA Toolkit, and feature links from the text directly to relevant instructions in the toolkit. [read post]
25 Aug 2016, 4:00 am by Monica Goyle
Hirers can find freelancers in the areas of app and software design, engineering and data science, business and administrative services, creative services such as writing and graphic design and even in legal. [read post]
16 Aug 2016, 7:34 am by Nicholas Weaver
Because of the sheer volume and quality, it is overwhelmingly likely that this data is authentic. [read post]
12 Aug 2016, 10:30 am by Rebecca Tushnet
  Another key principle: in service of designing patent and © to promote the forms of innovation we want to promote—another empirical Q. [read post]
10 Aug 2016, 7:20 am by John Delaney and Anthony M. Ramirez
In a social media age that values authenticity, more and more companies—even big, risk-adverse Fortune 100 companies—are interested in finding ways to leverage UGC relevant to their business, products or services. [read post]