(Total Views: 386)
Posted On: 12/01/2018 10:30:40 AM
Post# of 82676
I can Imagine the Judge looking at our previous case from 2017 upon receiving the latest citation from R&G, then seeing the latest (identical to 2017) response from SA's attorney. If it was me and I had no bias I would be wondering how a specific means of utilizing and manipulating computer hardware/software to improve security could relate to preschool or ancient greeks.
There is not a single way that there is a valid relation. SA's argument consists of authentication examples outside of a cyber world. R&G's argument consists of authentication within the cyber world. Specific code written to move information in a way that is separate from the normal way to move information. IN THE CYBER WORLD. IN THE HARDWARE. IN THE SOFTWARE.
I'm trying to find a single reason that could keep this case in SA's favor. I simply cannot find one. Good morning, by the way.
There is not a single way that there is a valid relation. SA's argument consists of authentication examples outside of a cyber world. R&G's argument consists of authentication within the cyber world. Specific code written to move information in a way that is separate from the normal way to move information. IN THE CYBER WORLD. IN THE HARDWARE. IN THE SOFTWARE.
I'm trying to find a single reason that could keep this case in SA's favor. I simply cannot find one. Good morning, by the way.
(11)
(0)
Scroll down for more posts ▼