Search for: "Root User" Results 241 - 260 of 1,673
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Apr 2016, 5:00 am by Daphne Keller
Both claims are rooted in rights that the ECHR has traditionally balanced carefully against free expression, so part of the answer may lie in that case law. [read post]
5 Sep 2020, 4:51 am by Nurfadzilah Yahaya
As I dug further in the archives, I found that the diasporic peoples I was tracing were rooting themselves in Southeast Asia, intertwining their roots with that of colonial jurisdictions which deepened over time with the added weight of subjects’ expectations. [read post]
8 Jun 2007, 12:33 pm
Imagine the fun if a virus circulated that changed the square root of 1, or decided that pi equals 2. [read post]
21 Sep 2015, 1:55 pm by Bill Budington
In the future, we hope to see more users protected by CT and its adoption across the web. [read post]
10 Dec 2019, 3:19 pm by Andrew Crocker
Facebook’s director for messaging privacy Jay Sullivan discussed ways that the company will root out abuse on its platforms while removing its own ability to read users’ messages. [read post]
25 Feb 2015, 5:05 pm by Jeremy Gillula and Joseph Bonneau
Like Komodia’s software, PrivDog installs a root certificate when it’s installed, which it then uses to sign the certificates it intercepts. [read post]
30 Dec 2023, 7:58 am by Jason Kelley
Third, the law endangers the privacy of all Utah users, as it requires many sites to collect and analyze private information, like government issued identification, for every user, to verify ages. [read post]
1 Dec 2017, 11:45 am
Discrimination in the virtual world is no less damaging than offline discrimination, but it can be even more difficult to root out. [read post]
22 Apr 2016, 3:33 am by INFORRM
Both claims are rooted in rights that the ECHR has traditionally balanced carefully against free expression, so part of the answer may lie in that case law. [read post]
28 Sep 2024, 3:25 am by Rob Robinson
This significant penalty, rooted in a 2019 investigation, underscores the growing scrutiny of global tech companies under the European Union’s stringent data privacy regulations. [read post]
16 Apr 2019, 8:39 pm by Danny O'Brien
At the time of his arrest, he was putting down roots in his new home, including co-founding Centro de Autonomia Digital, a non-profit devoted to creating user-friendly security tools, based out of Ecuador’s capital, Quito. [read post]
7 May 2014, 4:04 pm by Meena Harris
”Much of the support for a use system is rooted in its advantages of shifting responsibility from individuals to the entities that collect, maintain, and use data, while also holding data users accountable for how they manage data and any harms caused, rather than narrowly defining their responsibility as whether consent is properly obtained at the time of collection. [read post]
16 Apr 2019, 8:39 pm by Danny O'Brien
At the time of his arrest, he was putting down roots in his new home, including co-founding Centro de Autonomia Digital, a non-profit devoted to creating user-friendly security tools, based out of Ecuador’s capital, Quito. [read post]
24 Mar 2016, 7:00 am by Docket Navigator
[C]laims 1 and 6 are directed to 'alleviating congestion in a communication network' and recite steps used to perform the method for a flow of data to and from end user devices connected to a network through communication devices. [read post]
15 May 2017, 2:32 am by Romano Beitsma
The invention addresses the known view utilisation problem: given a user query written over base tables, as well as a collection of materialised views, which materialised views can be used to answer the query (description, page 2, first paragraph)? [read post]
17 Sep 2024, 6:45 am by Evangelina Cantu
  Given limitations of the data and the potential for errors, it is uncertain whether users may make inaccurate assumptions or conclusions. [read post]
25 Jul 2015, 4:34 pm by INFORRM
Their stated motive is said to be rooted in morality but blackmail may be a better word. [read post]
27 Jan 2010, 7:25 pm by Jim Harper
And I’ll be working to make sure that the good practices that take root in the earmark area branch out to other areas as well. [read post]
4 Feb 2011, 1:16 am by Fernando M. Pinguelo
  Thus, a basic way to secure your cloud is to make sure the hardware itself is secure – in other words, to create “hardware root of trust. [read post]