Search for: "Instructional Systems v. Computer" Results 161 - 180 of 1,093
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Jun 2020, 2:18 pm by Kevin LaCroix
  July 24, 2019: The law firm and Capital One sign a letter of agreement with Mandiant where Mandiant agrees to provide services and advice concerning “computer security incident response digital forensics, log, and malware analysis; and incident remediation. [read post]
12 Jun 2020, 1:53 am by Diane Tweedlie
In a communication accompanying the summons to oral proceedings, the Board set out its preliminary opinion that the invention did not involve an inventive step (Article 56 EPC).V. [read post]
4 Jun 2020, 4:10 pm by INFORRM
For example, platforms might have to deploy automated filters to find duplicates of unlawful material, instruct [read post]
28 May 2020, 2:28 pm by Daphne Keller
For example, platforms might have to deploy automated filters to find duplicates of unlawful material, instruct employees to [read post]
24 May 2020, 6:49 am by Mark Summerfield
  The Full Court has ruled that a claimed method and system, developed by Singapore-based Rokt Pte Ltd, for providing ‘a dynamic, context-based advertising system, introducing a distinction between an engagement offer, without a direct advertising benefit, and an advertisement designed to lead directly to the sale of the product’ is not patent-eligible subject matter under the Australian ‘manner of manufacture’ test: Commissioner of Patents v… [read post]
22 May 2020, 8:26 am by Eugene Volokh
Az.): Plaintiffs CDK Global LLC and Reynolds and Reynolds Company … develop, own, and operate proprietary computer systems known as dealer management systems ("DMSs") that process vast amounts of data sourced from various parties. [read post]
12 May 2020, 3:14 pm by Patricia Hughes
Given the uncertainty of the coronavirus and its impact on the legal system, however, it is highly likely the courts will be required to make sure everyone understands the rules as regards witness participation in a virtual hearing. [read post]
If the health application uses a cloud service as backend system, the cloud service must have a security certification (C5 – Cloud Computing Compliance Criteria Catalogue [KCC-C5] or equivalent). [read post]
4 May 2020, 7:23 am by Eric Goldman
” (Yes, Wilson appears to be arguing that Twitter discriminated against him because he’s a Christian heterosexual–a potentially mockable position in light of the many ways online systems implicitly privilege people with such characteristics. [read post]
30 Apr 2020, 4:09 pm by Kevin Cloutier and David Poell
As part of a sting operation, the FBI instructed Albo to ask Van Buren to run a computer search on a license plate number to determine if a strip club dancer was an undercover officer. [read post]
30 Apr 2020, 2:15 pm by Kevin Cloutier and David Poell
As part of a sting operation, the FBI instructed Albo to ask Van Buren to run a computer search on a license plate number to determine if a strip club dancer was an undercover officer. [read post]
20 Apr 2020, 5:01 am by Schachtman
 Although simple in concept, DPAs involve some complicated computations that embue them with an aura of “proofiness. [read post]
17 Apr 2020, 5:02 am by Eugene Volokh
§ 97-45-17: A person shall not post a message for the purpose of causing injury to any person through the use of any medium of communication, including the Internet or a computer, computer program, computer system or computer network, or other electronic medium of communication without the victim's consent …. [read post]