Search for: "DESIGNATION AND SENTENCE COMPUTATION CENTER" Results 101 - 120 of 261
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
16 Aug 2019, 3:00 am by Jim Sedor
National/Federal At Def Con, Hackers and Lawmakers Came Together to Examine Holes in Election Security Seattle Times – Taylor Telford (Washington Post) | Published: 8/12/2019 Hackers came had come to the DefCon computer security conference for a chance to probe voting machines used in U.S. elections. [read post]
6 Oct 2008, 5:01 am
Rockefeller Center, Radio City Music Hall and Apple's great glass cube on Fifth Avenue. [read post]
2 Jun 2010, 7:28 am by Steve Hall
State and local governments should expand their jury lists and use computer models that weight groups appropriately. [read post]
2 May 2012, 4:18 pm by David Kravets
Google, along with other companies, use databases of Wi-Fi networks and their locations to augment or replace GPS when attempting to figure out the location of a computer or mobile device. [read post]
3 Aug 2011, 12:01 am by Joel Zand
’ Nick Moline reminded us of that in his blog post about CALIcon11, the Center for Computer-Assisted Legal Instruction‘s annual conference in Milwaukee this year. [read post]
3 Aug 2011, 12:01 am by Joel Zand
Nick Moline reminded us of that in his blog post about CALIcon11, the Center for Computer-Assisted Legal Instruction‘s annual conference in Milwaukee this year. [read post]
16 Jan 2007, 12:17 am
Criminal Sanction Impact.01/10/07 referred to codes LAW / CRIM-PROCA1542 Bradley (MS) -- Relates to the payment of a fee for polygraph and related services by persons sentenced to probation following convictions for sex offense crimesSUMM : Add S246-a, Exec L; amd S65.10, Pen L Relates to the payment of a fee for polygraph and related services by persons sentenced to probation following convictions for sex offense crimes; authorizes the commissioner of the Westchester… [read post]
29 Feb 2012, 10:25 am by Sheppard Mullin
Of these three have been approved and three are still being reviewed by the committee designated to conduct the national security review. [read post]
29 Feb 2012, 10:25 am by Sheppard Mullin
Of these three have been approved and three are still being reviewed by the committee designated to conduct the national security review. [read post]
29 Jan 2018, 4:00 am by Jean O'Grady
“Our first step was to teach Watson the language of law,” said Khalid Al-Kofahi, vice president of Research Development at Thomson Reuters and head of its Center for Cognitive Computing. [read post]
17 Aug 2010, 11:18 pm
But then, so too do those convicts released at the end of their brutal, hardening sentences under our current system. [read post]
30 Jun 2014, 6:27 am
Although the panel was owned by Gusto's and located within the restaurant, the panel was operated by software that was designed and owned by United. [read post]
10 Jan 2017, 11:00 am by Thomas Reed Willemain
  I then become a “green badge” contractor and was moved from NSA to the Center for Computing Sciences (CCS). [read post]
27 Jun 2011, 1:15 pm by Lyle Denniston
Alito, Jr., of what the Scalia opinion called “disgusting video games,” the majority said those descriptions were designed “to disgust us, but disgust is not a valid basis for restricting expression. [read post]
9 Aug 2019, 3:00 am by Jim Sedor
” In sentencing Cesar Sayoc to 20 years in prison, a federal judge emphasized the need to look closely at both the crimes and their perpetrator. [read post]
27 Dec 2008, 9:58 am
What they have in common is a single factor: They were plainly designed to poison voters in swing states. [read post]
16 Sep 2007, 6:48 pm
State officials must notify offenders of the registry requirements prior to release from custody or immediately upon sentencing if not in custody, an [read post]
12 Jul 2017, 9:45 pm by sophia
While it’s true that computers are better at some tasks than people, understanding context in written and image-based communication is not one of those tasks. [read post]
18 Dec 2023, 4:15 pm by Michael Lowe
Utilizing artificial intelligence and computer software to create “deep fake” pornography has become concerning to many. [read post]