Search for: "Metadata Systems Software" Results 161 - 180 of 531
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Aug 2018, 10:31 am by Jim Baker
So AI systems can evaluate large volumes of metadata, emails or Word documents, for example, and also understand speech, recognize faces, perceive physical objects, and move. [read post]
15 Aug 2018, 5:45 am by Jennifer Brand
Using patented software that combines the best of legal research with the best of Web search, Fastcase helps busy users sift through the clutter, ranking the best cases first and enabling the re-sorting of results to find answers fast. [read post]
28 Jun 2018, 5:45 am by Jennifer Brand
Using patented software that combines the best of legal research with the best of Web search, Fastcase helps busy users sift through the clutter, ranking the best cases first and enabling the re-sorting of results to find answers fast. [read post]
27 Jun 2018, 8:00 am by James Kachmar
  In fact, at least one of the plaintiffs apparently testified that he had never looked at metadata information on any MLS system. [read post]
19 Jun 2018, 7:27 pm by Sabrina I. Pacifici
Computational Legal Studies: “Our next paper — OpenEDGAR – Open Source Software for SEC Edgar Analysis is now available. [read post]
15 Jun 2018, 6:00 am by Guest Blogger
 This includes not just cloud data storage, but also the software management systems that allow agencies to permit secure access, to tag metadata, and for services like redaction and transcription. [read post]
3 May 2018, 12:05 pm by Julia Stoyanovich
The database and cyberinfrastructure communities have been studying systems and standards for metadata, provenance, and transparency for decades. [read post]
25 Apr 2018, 5:45 am by Jennifer Brand
For example, litigators can create a Brief Bank and search for legal issues in their firms’ Knowledge Management system. [read post]
2 Apr 2018, 4:23 pm by Sabrina I. Pacifici
If it finds some suspected malware, it sends metadata of the file where the malware is stored, and some system information, to Google. [read post]
23 Feb 2018, 10:00 am by Jordan Brunner
In December 2017, the Russia-based cybersecurity firm Kaspersky Lab filed suit against the Department of Homeland Security over an order labeling Kaspersky software an “information security risk” and ordering the removal of all relevant software from government national security systems after a review process of 90 days. [read post]
12 Feb 2018, 8:00 am by Susan Landau
" This was in the days before locked iPhones presented an issue; then, the variety of operating systems and devices was itself doing in less technically capable police departments. [read post]
8 Feb 2018, 6:56 am by Chris Castle
[We’re pleased to have another guest post by a frequent and gifted MTP contributor, Maria Schneider . [read post]
7 Feb 2018, 4:25 pm by INFORRM
Intermediaries can block based on a web URL (like www.example.com for an entire site or www.example.com/page for a single page)[6]or an IP address (like 216.3.128.12).[7] In some cases they can disrupt elements of the Domain Name System in order to prevent a URL from resolving to the correct IP address.[8] Location-based blocking can be over-inclusive (like by blocking all content on an IP address, when only some of it is unlawful) and under-inclusive (like by… [read post]
29 Jan 2018, 5:00 am by Anonymous
Intermediaries can block based on a web URL (like www.example.com for an entire site or www.example.com/page for a single page)[6] or an IP address (like 216.3.128.12).[7] In some cases they can disrupt elements of the Domain Name System in order to prevent a URL from resolving to the correct IP address.[8] Location-based blocking can be over-inclusive (like by blocking all content on an IP address, when only some of it is unlawful) and under-inclusive (like by blocking one instance of an… [read post]
25 Jan 2018, 3:42 pm by Sabrina I. Pacifici
It is used primarily to reliably exchange documents independent of platform—hardware, software or operating system. [read post]
10 Jan 2018, 7:45 am by Mary Costigan and Joseph J. Lazzarotti
With the continuing parade of high profile data security breaches, the concern U.S. organizations have about the security of their systems and data has been steadily growing. [read post]
20 Dec 2017, 11:40 am by Gritsforbreakfast
They can't simply look to the text of the fourth amendment and see something that gets you to metadata from your cell phone. [read post]