Search for: "Authentic Designs" Results 1881 - 1900 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Jan 2015, 3:45 am
" Indeed, the problem of authenticity has been raised by some commentators who have argued that, because of copyright constraints, historical accuracy has been negatively affected.But is this all copyright's fault? [read post]
9 Jan 2015, 11:22 am
They usually duplicate the logo, design, style of writing, and even signatures of a reputed establishment to deceive people into thinking them legitimate. [read post]
9 Jan 2015, 11:22 am
They usually duplicate the logo, design, style of writing, and even signatures of a reputed establishment to deceive people into thinking them legitimate. [read post]
9 Jan 2015, 8:31 am by Gene Quinn
Enhanced licensing techniques that authenticate clients for software programs are disclosed and protected by U.S. [read post]
5 Jan 2015, 7:26 am by Tom Webley
” In order to design the organisation’s security network effectively to minimise these risks, the ‘BYOD Guidance: Device Security Consideration’ document recommends that organisations consider authentication and protection for data in transit and for data at rest. [read post]
24 Dec 2014, 4:50 am by Ron Coleman
 For buttons that were removed from authentic designer clothing. [read post]
22 Dec 2014, 10:00 am by HL Chronicle of Data Protection
However, that perception undervalues the strength of security programs that are designed to meet the reasonableness requirement. [read post]
22 Dec 2014, 4:00 am by Ruth Bird
What the librarians have done on your behalf is search, identify and authenticate relevant websites, books, journals. [read post]
19 Dec 2014, 2:10 pm by Dan Goodin
"This worm uses a brute force authentication attack to propagate via Windows SMB shares," Friday's advisory stated. [read post]
12 Dec 2014, 7:34 am by Rebecca Tushnet
The angry monkey patch is a small part of this vision, helping to create “an authentic universe of morale patches, like those available in the real world. [read post]
10 Dec 2014, 4:56 am
Strategic Information Professionals are the most important  pre-requisite in designing a digital library strategy. [read post]
9 Dec 2014, 6:29 pm by John Palley
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
9 Dec 2014, 6:29 pm by John Palley
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
9 Dec 2014, 3:50 pm by John Palley
Nonetheless, the competent authorities of any Contracting Party may, if necessary, satisfy themselves as to the authenticity of the signature of the authorized person. [read post]
4 Dec 2014, 11:09 am by Ted Brooks
This callout is typically displayed on top of the source document, showing it (for authentication) but making it difficult to view (controlling focus). [read post]
29 Nov 2014, 3:53 am by Legal Beagle
Mr McKenzie then began working for a rival.In December 2012, Mackenzie Hall obtained an interim interdict from a court which was designed to stop him from working for the new company but Mr McKenzie ignored the order. [read post]
25 Nov 2014, 5:37 am by Jim Singer
Sept. 5, 2014), the court addressed eligibility of a patent covering software for designing sheet metal forming tools. [read post]
19 Nov 2014, 12:32 pm by Ray Dowd
What's Happening With Authentication and IndemnificationLunch (Provided) and Keynote AddressPanel 4: Matter of Flamenbaum and the Recovery of Antiquities -- News from the NY Court of AppealsPanel 5: Are Museums Researching Their Collections? [read post]