Search for: "Computer Share" Results 1 - 20 of 17,170
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
3 Dec 2011, 9:29 pm by tekEditor
"Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,... [read post]
5 Dec 2011, 12:02 pm by Harold O'Grady
"Cloud computing" which Webopedia defines as a "type of computing that is comparable to grid computing, relies on sharing computing resources rather than having local servers or personal devices to handle applications. [read post]
20 Mar 2007, 5:31 am
Shares of Affiliated Computer surged 17 [...] [read post]
6 Sep 2014, 8:20 am by John Floyd
File sharing permits the public or private sharing of computer data in a network that allows multiple people to read, view, modify, copy, print, or write in the same file. [read post]
24 May 2013, 6:00 am by Kenneth J. Vanko
The factual matrix in that case (also from California) involved something very similar to what I've just described: gaining access to a protected computer system through password sharing. [read post]
15 Feb 2011, 1:12 pm by admin
  Special thanks to computer forensics and security expert Sharon Nelson for sharing the link. ========== To return to the main page of the blog, click here. [read post]
29 Jul 2011, 6:01 am by Katie Koch
According to Webopedia, cloud computing is a type of computing that relies on sharing computing resources rather than using local servers or personal devices to handle applications. [read post]
12 Jan 2022, 1:05 pm by CodeX
Lance Eliot, share their views on computational antitrust and its implication for futures of AI and law. [read post]
8 Jan 2015, 4:39 am by Abdo Law Firm
In addition, the user may also provide files from a computer to the shared folder for others to obtain. [read post]
8 Jan 2015, 4:39 am by Abdo Law Firm
File sharing sites on the internet allow the access of digital content from other computers connected on a peer to peer (P2P) network. [read post]
22 Oct 2014, 7:28 am
The percentage of women in computer science flattened, and then plunged, even as the share of women in other technical and professional fields kept rising. [read post]
6 Jul 2009, 12:56 am
I've done a couple of posts on police officers using file-sharing software like Limewire or Kazaa to find child pornography on people's computers. [read post]
8 Jan 2015, 9:39 am
In addition, the user may also provide files from a computer to the shared folder for others to obtain. [read post]
12 May 2013, 5:00 pm
 Sometimes, they even replace the need for an actual desktop or laptop computer. [read post]
21 May 2007, 4:05 pm
This is carried over into the lack of a Mac tablet computer and Apple has not expressed any interest in this market especially since tablet PCs do not currently have a large market share. [read post]
11 Feb 2016, 12:02 pm by Stephen R. Miller
Late last year, I was approached by several computer scientists about their desire to propose a regulatory system for short-term rentals in London based upon the transferable sharing rights model I had proposed in an article forthcoming from the Harvard... [read post]
20 Aug 2009, 11:00 am
Law passed during the 2009 session of the Florida Legislature has modified the method of computing and satisyfing the forced share of a surviving spouse, including the sources from which the forced share is now payable. [read post]
28 Apr 2016, 11:35 am by Jerri Lynn Ward, J.D.
This is the story of a successful lab company brought down by an employee using LimeWire file-sharing on her work computer. [read post]
25 Nov 2015, 4:12 pm by Sabrina I. Pacifici
Fueled in part by the rapid adoption of smartphones and tablets, the share of American adults who own a smartphone, computer and a tablet has doubled since 2012. [read post]
16 Oct 2017, 9:17 am by Scott E. Atkinson
 Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition of accessing a computer “without authorization” when using someone else’s credentials (with that other user’s permission) after the owner of the computer expressly revoked the first person’s own access rights. [read post]