Search for: "Authentic Designs" Results 1941 - 1960 of 2,918
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Aug 2014, 12:01 pm by Stephen Bilkis
They are also referred to as statutes designed to correct imperfections in prior law by generally giving relief to the aggrieved party. [read post]
12 Aug 2014, 12:26 pm by Pamela Jones Harbour and Jenna Felz
  The security company Veracode advises companies to take simple precautions during the development phase to prevent SQLi attacks, such as: Adopt an input validation technique in which user input is authenticated against a set of defined rules for length, type, and syntax and also against business rules; Ensure that users with the permission to access the database have the least privileges; Make sure that a database user is created only for a specific application and this user is not… [read post]
12 Aug 2014, 7:53 am by Paul Rosenzweig
Unlike most of the general public who were breathless over the extent of the breach, most of the researchers in Las Vegas were skeptical of the scope of the breach, its provenance, and its authenticity. [read post]
11 Aug 2014, 5:00 am by Mintzer Law
Documents in which the suspect made reference to the authentic mark when instructing manufacturers or others about the product to be produced might indicate knowledge. [read post]
21 Jul 2014, 12:11 pm by Jonathan Bailey
Select a good registrar, renew your names promptly, make sure to use strong passwords and, if possible, use two-factor authentication to deter those who might try to hack into your account. [read post]
18 Jul 2014, 9:52 am by The Book Review Editor
Over opposition from military and civilian leaders, Gates implemented what became a $45 billion program to build Mine-Resistant Ambush Protect (MRAP) vehicles designed to protect soldiers against the menace of Improvised Explosive Devices (IEDs). [read post]
14 Jul 2014, 11:05 am by Dennis Crouch
Under Egyptian Goddess, a design patent is infringed if “an ordinary observer, familiar with the prior art designs, would be deceived into believing that the accused product is the same as the patented design. [read post]
13 Jul 2014, 10:58 am by Schachtman
Jan. 3, 2006) (noting that Daubert is not designed for gatekeeping of a non-scientific, historian expert witness’s methodology); Saginaw Chippewa Indian Tribe of Michigan v. [read post]
11 Jul 2014, 6:35 am by Martha Engel
  If someone eliminated your protected words from your design logo, would you be adequately protected? [read post]
13 Jun 2014, 8:21 am by Susan McLean
But these new social media apps (such as “Secret,” “Whisper,” “Yik Yak”) are designed specifically to enable users to share posts anonymously. [read post]
11 Jun 2014, 11:44 am by Jeremy Gillula and Seth Schoen
The designers of technologies never considered that technical standards would let everyone around you notice your device's presence. [read post]
11 Jun 2014, 5:09 am by Rebecca Tushnet
Their authenticity wasn’t beyond dispute, especially as to minutes of a teleconference prepared by SPD purporting to memorialize the call. [read post]
6 Jun 2014, 5:07 am by Arvind Narayanan
Now that we’ve taken care of encryption, we want to ensure one more security property: authenticity. [read post]
5 Jun 2014, 12:56 pm by Venkat Balasubramani
Microsoft/Yahoo Telephone Numbers as Identity Authenticators–Abrams v. [read post]
4 Jun 2014, 1:13 pm by Tina Gheen
Ines Kerle, the head of digital media and corporate design for the Parliament of Austria. [read post]
2 Jun 2014, 2:33 pm by Law Lady
VICTOR TOMAS GONZALEZ DEL REAL, Appellee. 2nd District.Eminent domain -- Inverse condemnation -- Trial court properly determined that city's refusal to change comprehensive plan's designation of two parcels, a golf course parcel and a condo parcel within the golf course parcel, did not deprive the owners of all economically viable use of property -- City rebutted presumption that the two parcels should be treated separately -- Expert testimony that the parcels, treated as a single… [read post]
31 May 2014, 6:19 pm by Michael Froomkin
If we each have only one identity capable of transacting, and if our access to communications resources, such as ISPs and email, requires payment – or even just authentication – then all too quickly everything we do online is at risk of being joined to our dossier. [read post]
30 May 2014, 5:00 am
  As the district court explained, “[T]he court may consider a document attached to [the motion] without converting the motion into one for summary judgment if the attached document is (1) central to the plaintiff’s claim and (2) undisputed,” which means “the authenticity of the document is not challenged. [read post]
27 May 2014, 4:00 am by Linda K. Robertson
We are all at our best when we bring our authentic selves to work. [read post]