calendardigital-marketingit-solutionslocation-dotlogo-footertech-journal-logo-footerweb-development

Open filters Close filters

BTLJ Blog
December 21st, 2014
For many smartphone users, passwords and passcodes have become a thing of the past. Since late 2013, Apple iPhone users have been able to access their phones by simply applying their stored fingerprint to the Home Button. Many Android devices offer the same feature. And now, Touch ID does more ...
BTLJ Blog
May 16th, 2013
The Copyright Alert System (CAS) was rolled out in late February 2013. CAS constitutes the United States realization of the international concept of “graduated response programs:” frameworks for media owners to address alleged online copyright infringements with computer users through their Internet Service Providers (ISPs). Key features of CAS – ...
BTLJ Blog
February 22nd, 2011
The Immigrations and Customs Enforcement (ICE), under the Department of Homeland Security, engaged in another round of domain name seizures Valentine’s Day, February 14, 2011. The 18 domain name seizure, “Operation Broken Hearted,” focused on counterfeit sites for selling counterfeit luxury product brands such as Tiffany, Burberry and Channel. As ...
BTLJ Blog
November 4th, 2010
Not only was the landmark peer-to-peer file-sharing trial involving Northern Minnesotan Jammie Thomas-Rasset the first of its kind to reach trial; Thomas-Rasset’s file-sharing litigation will likely come to its third trial on November 2, 2010. Thomas-Rasset downloaded 24 pop hits of the 1980s and 1990s and was found liable in 2007 for $222,000 in statutory ...