Search for: "Authentic Designs " Results 1941 - 1960 of 2,913
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
4 Dec 2006, 12:28 pm
Some who saw the “photo” are probably still believing it was authentic. [read post]
18 May 2015, 12:59 pm by Craig Hoffman
EMV is a smart-chip technology for payment cards—EMV cards have an embedded microprocessor chip that creates a dynamic authentication code for each transaction. [read post]
5 Jan 2021, 1:16 pm by Gyi Tsakalakis
In fact, my best legal marketing tip is the same as it was in 2013: Be authentic. [read post]
5 May 2009, 12:26 pm
The exception to the wiki format is with authenticated accounts. [read post]
5 Dec 2018, 11:52 am by Mayank Varia
The encryption systems currently deployed in these jurisdictions permit more surveillance with less accountability than a properly-designed EA system might offer. [read post]
12 Oct 2017, 2:19 pm by Kenneth Vercammen Esq. Edison
If a party has mistakenly designated a defense as a counterclaim or a counterclaim as a defense, the court, on terms if the interest of justice requires, shall treat the pleading as if there had been a proper designation. 4:5-5. [read post]
12 Aug 2021, 2:06 pm by Rebecca Tushnet
Inconsistency/predictability critiques could be applied to reasonable royalties too, especially in patent, but there are some ways to deal with that, and it might be easier in © and design patent where the damage awards are lower. [read post]
20 May 2016, 10:07 am by Rebecca Tushnet
 Hartzog: authenticity fraud: you don’t understand that there’s a mechanism hidden behind the interaction by which this stuff is delivered to you. [read post]
From battlefield pictures and press releases to screenshots and memes, images afford innumerable opportunities to jihadists eager to design, package, or disseminate content advancing IS’ cause. [read post]
One apparent misfire, for example, was the suppression of an October 2020 New York Post article about Hunter Biden’s laptop (most of which other publications have now confirmed to be authentic). [read post]
26 Dec 2019, 5:00 am by Eric Halliday
It would also mandate that foreign banks provide authentic account records and comply with subpoenas produced by American law enforcement officials in AML and CFT investigations. [read post]
13 May 2021, 7:06 am by Bryce Klehm
       (c)  The recommended contract language and requirements described in subsection (b) of this section shall be designed to ensure that:           (i)    service providers collect and preserve data, information, and reporting relevant to cybersecurity event prevention, detection, response, and investigation on all information systems over which they have control, including systems operated on… [read post]
15 Jun 2023, 11:31 am by John Butler, Steve Stransky
These measures address technical security (configuration management, identification and authentication, systems and communication protection), physical security (access controls, environmental safety), and administrative security (awareness, training, personnel security). [read post]
8 Dec 2022, 7:50 am by James M. Campbell
  DLT could potentially serve as the digital ledger for the registration, authentication, and participation of these DERs in a smart grid, enabling flexible grid operations as more variable renewables are adopted. [read post]
22 Mar 2019, 4:47 am
The Opponent favors the French interpretation of the relevant provision, arguing that the French text of the Paris Convention is the authentic text.On the question of the applicability of national law to the question of the right to claim priority, Opponent 1 argued that is it is simply not necessary to look into the substantive national law of any one country, and to do so would be unworkable. [read post]
28 Aug 2020, 1:58 pm
Most of them are designed to keep me from overthinking things. [read post]
14 Feb 2016, 4:16 pm by Benjamin Wittes, Zoe Bedell
In Part I of this series, we listed the many designated foreign terrorist organizations (DFTOs) that seem to have overt Twitter accounts. [read post]
16 Dec 2020, 11:24 am by Daly Barnett
To protect your account security, are you using strong unique passwords and multi-factor authentication on each of your accounts? [read post]