Search for: "Root User" Results 181 - 200 of 1,886
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
11 Dec 2014, 4:30 am by Barry Sookman
http://t.co/c0PdQZNgex: blame the author http://t.co/KOhvxCzoSn -> Korean cultural export success rooted in freedom and democracy, industry insiders say http://t.co/IVedAcz1gc -> Kim Dotcom & the Illusion of Freedom http://t.co/MQt0z5ix7n -> Spotify Must “Adapt Or Die” : Pricing For Sustainability http://t.co/ZiDzUpTXhH -> CASL software consent chart http://t.co/hQpOGAio37 -> Australia's Gov't Starts Clock on ISPs' Anti-Piracy Code… [read post]
22 Nov 2013, 4:00 pm by Marvin Ammori
Users of iCloud and Dropbox cloud storage services entrust their photos, documents and videos on Apple and Dropbox servers. [read post]
6 Mar 2024, 10:09 am by Cory Doctorow
Every time a user moves from one service to another, the resulting data-flows create risks for those users and their friends, families, customers and other social connections. [read post]
21 Feb 2007, 1:14 am
Is a decentralized, user-based security system capable of protecting users in a scenario of this scale? [read post]
25 Aug 2023, 4:51 am by Bob Kraft
By understanding the root causes of crashes, developers can take appropriate actions to fix the bugs or issues that lead to these crashes. [read post]
3 Oct 2023, 5:19 am by Bob Ambrogi
From those roots was developed Clarra, a cloud-based case management platform that spun off from the firm and is formally launching today. [read post]
1 Jan 2020, 8:21 am by Bill Budington
In the first month of 2019, Facebook was found to have been paying people to give up their privacy by installing an application that spies on them, doing this by having them install a root security certificate on their iOS device. [read post]
26 Nov 2017, 11:30 am by David J. Halberg, Esq.
Meanwhile, about 60 percent of those claims involved user error factors, like copying and pasting progress notes, data entry mistakes and alert fatigue. [read post]
15 Dec 2022, 2:31 pm by Jason Kelley
The bill still creates liability for any service that delivers the content to the user, because at root, if the service is aware the user is a minor—or should know, in the language of the bill—the service is still on the hook for any content presented that is not in the user's “best interest. [read post]
18 Jun 2024, 8:35 am by Rory Mir
Each is distinct, but their differences can be hard to understand as they’re rooted in their different technical approaches. [read post]
8 May 2018, 4:00 am by Jesse Sowell
The second (often an unintended consequence of the first) is how to avoid creating bigger problems when users discard or circumvent “safeguards” that do get in the way of everyday workflows—which further obscure the root causes of the security problem. [read post]
19 Feb 2015, 1:16 pm by Kelly Phillips Erb
“At the root of these rules,” Feiler explained, “is that the product be secure. [read post]
27 Sep 2011, 7:42 am
Many observers are calling for tighter enforcement rules to root out fraud. [read post]
24 Dec 2015, 6:00 am by Jessica Gutierrez Alm
 The usefulness requirement has roots in the Constitutional grant of power for issuing patents, providing that “Congress shall have power . . . [read post]
30 Mar 2007, 3:46 pm
But the difference on the Web is the speed at which the information is disseminated -- and then again just as quickly rooted out as misinformation by the more skeptical minds of the blogosphere. [read post]
6 Nov 2014, 11:03 am by Parker Higgins
That's important because jailbreaking (or "rooting," on Android devices) has real-world implications for users' ability to use their phones and tablets effectively and securely. [read post]
6 Jul 2023, 7:28 am by Christian Romero
Will you join us and help shape tech’s future for the users? [read post]
25 Nov 2015, 7:06 am
In other words, these requests related to videos that were protected as fair use under §107.Google’s announcement that it will defend content uploaded onto YouTube by users/creators is rooted within the idea that “creators can be intimidated by the DMCA’s counter notification process, and the potential for litigation that comes with it ... [read post]