Search for: "Root User" Results 181 - 200 of 1,862
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
11 Dec 2014, 4:30 am by Barry Sookman blame the author -> Korean cultural export success rooted in freedom and democracy, industry insiders say -> Kim Dotcom & the Illusion of Freedom -> Spotify Must “Adapt Or Die” : Pricing For Sustainability -> CASL software consent chart -> Australia's Gov't Starts Clock on ISPs' Anti-Piracy Code… [read post]
22 Nov 2013, 4:00 pm by Marvin Ammori
Users of iCloud and Dropbox cloud storage services entrust their photos, documents and videos on Apple and Dropbox servers. [read post]
6 Mar 2024, 10:09 am by Cory Doctorow
Every time a user moves from one service to another, the resulting data-flows create risks for those users and their friends, families, customers and other social connections. [read post]
25 Aug 2023, 4:51 am by Bob Kraft
By understanding the root causes of crashes, developers can take appropriate actions to fix the bugs or issues that lead to these crashes. [read post]
21 Feb 2007, 1:14 am
Is a decentralized, user-based security system capable of protecting users in a scenario of this scale? [read post]
3 Oct 2023, 5:19 am by Bob Ambrogi
From those roots was developed Clarra, a cloud-based case management platform that spun off from the firm and is formally launching today. [read post]
1 Jan 2020, 8:21 am by Bill Budington
In the first month of 2019, Facebook was found to have been paying people to give up their privacy by installing an application that spies on them, doing this by having them install a root security certificate on their iOS device. [read post]
26 Nov 2017, 11:30 am by David J. Halberg, Esq.
Meanwhile, about 60 percent of those claims involved user error factors, like copying and pasting progress notes, data entry mistakes and alert fatigue. [read post]
15 Dec 2022, 2:31 pm by Jason Kelley
The bill still creates liability for any service that delivers the content to the user, because at root, if the service is aware the user is a minor—or should know, in the language of the bill—the service is still on the hook for any content presented that is not in the user's “best interest. [read post]
8 May 2018, 4:00 am by Jesse Sowell
The second (often an unintended consequence of the first) is how to avoid creating bigger problems when users discard or circumvent “safeguards” that do get in the way of everyday workflows—which further obscure the root causes of the security problem. [read post]
19 Feb 2015, 1:16 pm by Kelly Phillips Erb
“At the root of these rules,” Feiler explained, “is that the product be secure. [read post]
27 Sep 2011, 7:42 am
Many observers are calling for tighter enforcement rules to root out fraud. [read post]
24 Dec 2015, 6:00 am by Jessica Gutierrez Alm
 The usefulness requirement has roots in the Constitutional grant of power for issuing patents, providing that “Congress shall have power . . . [read post]
30 Mar 2007, 3:46 pm
But the difference on the Web is the speed at which the information is disseminated -- and then again just as quickly rooted out as misinformation by the more skeptical minds of the blogosphere. [read post]
30 Dec 2015, 7:25 am by Karen Gullo
 report showed that many major technology companies are adopting best practices around transparency and protecting user data when the government comes knocking. [read post]
25 Nov 2015, 7:06 am
In other words, these requests related to videos that were protected as fair use under §107.Google’s announcement that it will defend content uploaded onto YouTube by users/creators is rooted within the idea that “creators can be intimidated by the DMCA’s counter notification process, and the potential for litigation that comes with it ... [read post]
6 Jul 2023, 7:28 am by Christian Romero
Will you join us and help shape tech’s future for the users? [read post]
2 Aug 2019, 12:16 pm by Arina Shulga
. $100 million for inaccurately disclosing the risk of misuse of user data. [read post]
6 Nov 2014, 11:03 am by Parker Higgins
That's important because jailbreaking (or "rooting," on Android devices) has real-world implications for users' ability to use their phones and tablets effectively and securely. [read post]