Search for: "Core Distribution" Results 1661 - 1680 of 3,645
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
25 Mar 2018, 8:55 pm by Stuart Kaplow
It applies to Existing Buildings, Schools, Retail, Hospitality, Data Centers, and Warehouses & Distribution Centers. [read post]
25 Mar 2018, 8:55 pm by Stuart Kaplow
It applies to Existing Buildings, Schools, Retail, Hospitality, Data Centers, and Warehouses & Distribution Centers. [read post]
25 Mar 2018, 8:55 pm by Stuart Kaplow
It applies to Existing Buildings, Schools, Retail, Hospitality, Data Centers, and Warehouses & Distribution Centers. [read post]
25 Mar 2018, 1:13 pm by Jim Gerl
Section 2 displays estimates for the reported locations in school at which bullying victimization occurred, and the percentage distribution of the frequency, type, and impacts of bullying victimization reported by students ages 12 through 18, by selected student and school characteristics (tables 2.1–2.10). [read post]
25 Mar 2018, 8:36 am
  It starts with the usual reaffirmation of core international declarations and then recalls "all relevant human rights treaties" (whatever they may be--and again that may reference different "cocktails" of law depending on national willingness to adopt and embed such treaties into national law). [read post]
23 Mar 2018, 8:22 am by Richard J. Harknett
The vision realizes that unlike in the terrestrial spaces where strategic effects have required territorial aggression (or the threat thereof), cyber operations have opened a new seam in the distribution of power and can impact relative power without traditional armed aggression. [read post]
22 Mar 2018, 7:15 am by Ahad Ahmed
In other words, by spinning out portions of its business, a conglomerate can theoretically open up opportunities more in line with its core business. [read post]
19 Mar 2018, 3:49 pm by Josh Fensterbush
Like some jurisdictions in the US, Australian retailers, importers, and distributers subject to negligence actions are protected by a “sealed container” defense, where they only have a duty to guard against known dangers, and those they reasonably should have known about. [read post]
19 Mar 2018, 10:56 am by Michelle Maiese
 Intractable conflicts are ones that remain unresolved for long periods of time and then become stuck at a high level of intensity and destructiveness. [read post]
15 Mar 2018, 7:16 am by John Jascob
He further noted, however, that Dodd-Frank’s “core elements” would be left in place. [read post]
14 Mar 2018, 8:35 am by Gustav L. Schmidt
Blockchain technology, at its core, is merely a set of linked records that form an immutable ledger. [read post]
12 Mar 2018, 3:12 pm by Kevin Wong
Informed and skilled supervision of FinTech activities will be a core theme of the action plan. [read post]
12 Mar 2018, 12:50 am by Florian Mueller
Rathod is trying to get the very same claims as Twitter's core patent claims granted, but based on what credibly appears to be an earlier priority date.It could be that an Indian patentee ends up owning what was considered a core Twitter patent. [read post]
11 Mar 2018, 8:07 am
This complex line has been at the core of indigenous rights advocacy, the relative success of which provides some hope for the future of international law at a challenging time. [read post]
5 Mar 2018, 10:43 am by Camilla Alexandra Hrdy
During the 2016 presidential race, an op ed in the New York Times by Jacob S. [read post]
5 Mar 2018, 10:43 am by Camilla Alexandra Hrdy
During the 2016 presidential race, an op ed in the New York Times by Jacob S. [read post]
5 Mar 2018, 2:58 am by Peter Mahler
There’s one particular subspecies of deadlock dissolution that may not be motivated primarily by the usual disputes over finance, personnel, owner compensation, budget, distributions, or other such operational issues. [read post]
26 Feb 2018, 5:02 am by Ed Felten
 The core idea goes back to at least the 1990s: replicate a system’s state across a set of machines; use some kind of distributed consensus algorithm to agree on an append-only log of events that change the state; and use cryptographic hash-chaining to make the log tamper-evident. [read post]