Search for: "Authentic Designs" Results 1841 - 1860 of 2,935
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 May 2015, 1:02 am by rhapsodyinbooks
He worked tirelessly and seemed to think of everything: he even had guns designed according to the specifications of the country he was invading, so that his soldiers would know how to use any captured guns. [read post]
28 May 2015, 1:38 pm by Rebecca Tushnet
It’s a lot to ask of software not designed to do this. [read post]
28 May 2015, 9:54 am by Rebecca Tushnet
(or designated alternate Stratasys witness): The output is very dependent on the material and authenticity, though the input is not. [read post]
28 May 2015, 7:49 am by Joseph J. Lazzarotti
In addition, firms must adopt policies and procedures reasonably designed to ensure that their associated persons who participate in social media sites for business purposes are reasonably supervised to ensure that their communications are fair and balanced. [read post]
27 May 2015, 3:01 pm by Alexander Major
 The effort, however, is more than a simple housekeeping exercise, the re-designation of CUI will also bring changes to the manner in which contractor-generated information residing on contractor-owned systems is stored and secured. [read post]
27 May 2015, 1:09 pm by Rebecca Tushnet
  They’re part of strengthening the media understanding muscle, like an exercise, not designed for an authentic audience with a real world wide distribution. [read post]
26 May 2015, 4:30 am by Rebecca Tushnet
”  Proponents, reasonably, countered that while all of those things were indeed scary and bad, they weren’t the sorts of ills copyright law was designed to prevent. [read post]
24 May 2015, 9:30 pm by Dori Molozanov
Smart cards, which the GAO reports have been used in France and Germany since the 1990s, are more secure and “provide higher levels of authentication. [read post]
18 May 2015, 12:59 pm by Craig Hoffman
EMV is a smart-chip technology for payment cards—EMV cards have an embedded microprocessor chip that creates a dynamic authentication code for each transaction. [read post]
17 May 2015, 1:50 pm by Steve Sheinberg
Require the ability to push authenticated patches and software updates. [read post]
17 May 2015, 9:07 am by Aaron Weems
As an interim order, this matter was scheduled for an evidentiary hearing and designated complex which allowed the parties to conduct discovery (typically “simple” support cases do not permit discovery). [read post]
16 May 2015, 7:51 pm
Two of the five phases of the Cartesian method, prepared by Descartes, comes to my mind at the moment, they are: we should consider as only certainty the fact of thinking; and that things designed with clarity and distinction are all true. [read post]
14 May 2015, 7:57 am by Jennifer Farer
Funds and advisers need to identify and account for their respective compliance obligations under the federal securities laws and mitigate exposure to cyber-related compliance risks through compliance policies and procedures that are reasonably designed to prevent violations of the federal securities laws. [read post]
7 May 2015, 7:08 pm by Kevin LaCroix
”[xii] Employ DMarc Based Technology: Many companies have chosen to employ a technology-based solution founded on DMarc, or “Domain-based Message Authentication, Reporting & Conformance. [read post]
7 May 2015, 6:30 am by Reuel Schiller
For more about these contradictions, see Suleiman Osman’s great book The Invention of Brownstone Brooklyn: Gentrification and the Search for Authenticity in Postwar New York. [read post]
6 May 2015, 1:39 pm by John Wright
Upon approval of an application, NDHHS issues a serially numbered MMJ card to the applicant and, if the applicant designates a primary caregiver, to the designated primary caregiver. [read post]
6 May 2015, 1:39 pm by John Wright
Upon approval of an application, NDHHS issues a serially numbered MMJ card to the applicant and, if the applicant designates a primary caregiver, to the designated primary caregiver. [read post]
6 May 2015, 10:08 am by Kristen J. Mathews
When designing, implementing and monitoring cybersecurity programs, the Guidance Update suggests that advisers be mindful of their obligations under the federal securities laws. [read post]
3 May 2015, 10:53 pm
Walter was an impassioned and persuasive advocate of his company's ethos, its concept of "conscious capitalism", the notion that companies can have purposes just as individuals can, and that the two key tenets of a brand that grows to embrace the needs of a growing company are those of authenticity and transparency. [read post]