Sentences with phrase «used by key»

KeyBiscayneRecruiter.com is a Key Biscayne job board used by Key Biscayne employers and staffing firms of all sizes to find local talent.
KeyLargoRecruiter.com is a Key Largo job board used by Key Largo employers and staffing firms of all sizes to find local talent.
A quick competition put together that could be used by all key stages.
I have put into quotation marks some of the words used by the key players, but only where I have been able to rely on the written transcripts, or my own notes, or indeed my clear recollections.

Not exact matches

You can use media relations tactics to place articles and win interviews, get coverage by allowing key press to review your product, hold a launch event, or use grass roots marketing to build buzz.
The key is to avoid a company that has only a few drugs in the pipeline that one day may or may not be approved for use by the FDA.
FRANKFURT, April 17 - More than 100 parts for U.S. space agency NASA's deep - space capsule Orion will be made by 3 D printers, using technology that experts say will eventually become key to efforts to send humans to Mars.
The key findings can be summarized in one simple statement — a person's experience with your landing page forms is directly influenced by the colors you use.
This can be shelved by using key words that give the sentence meaning.
You can get your listeners» attention by thoughtfully, strategically and sparingly using key phrases that show that you're paying attention to them - their strengths, their concerns, and their priorities.
Then, figuring that Snowden was savvy enough to use encryption that couldn't be cracked by brute force, the government also demanded that Levison hand over Lavabit's private encryption key — something the Justice Department has threatened to demand of Apple (aapl) as well.
A key element to fostering scale and growth is to ensure that, when you are deploying technology for use by others, you are not giving away more than is required, but that you are giving enough that allows customers to buy more.
They may also be used by firms that are trying to attract key employees, prospect for new business, deal with suppliers or simply to understand how to manage their companies better.
It had been used in accounts, but only in accounts and by accountants so it was a pretty dusty, neglected key on the board.
Founded in 2014 by Jacob Wood, the NYC - based startup uses key measurements like inseam, neck, sleeve, and waist sizes, along with height, weight, and desired fit to guarantee perfectly fitted clothing made just for you.
«Our goal is to use this investment to enhance the viewing experience with the addition of new content and development of key features directed at sports fans, and to greatly increase our marketing efforts,» David Gandler, fuboTV co-founder and CEO, told Fortune by email.
The victim eventually escaped his ordeal by running into a deli, but not before Meza had used his keys to enter his apartment and steal the hardware wallet, using the password to transfer the Ethereum to his own account.
Such risks, uncertainties and other factors include, without limitation: (1) the effect of economic conditions in the industries and markets in which United Technologies and Rockwell Collins operate in the U.S. and globally and any changes therein, including financial market conditions, fluctuations in commodity prices, interest rates and foreign currency exchange rates, levels of end market demand in construction and in both the commercial and defense segments of the aerospace industry, levels of air travel, financial condition of commercial airlines, the impact of weather conditions and natural disasters and the financial condition of our customers and suppliers; (2) challenges in the development, production, delivery, support, performance and realization of the anticipated benefits of advanced technologies and new products and services; (3) the scope, nature, impact or timing of acquisition and divestiture or restructuring activity, including the pending acquisition of Rockwell Collins, including among other things integration of acquired businesses into United Technologies» existing businesses and realization of synergies and opportunities for growth and innovation; (4) future timing and levels of indebtedness, including indebtedness expected to be incurred by United Technologies in connection with the pending Rockwell Collins acquisition, and capital spending and research and development spending, including in connection with the pending Rockwell Collins acquisition; (5) future availability of credit and factors that may affect such availability, including credit market conditions and our capital structure; (6) the timing and scope of future repurchases of United Technologies» common stock, which may be suspended at any time due to various factors, including market conditions and the level of other investing activities and uses of cash, including in connection with the proposed acquisition of Rockwell; (7) delays and disruption in delivery of materials and services from suppliers; (8) company and customer - directed cost reduction efforts and restructuring costs and savings and other consequences thereof; (9) new business and investment opportunities; (10) our ability to realize the intended benefits of organizational changes; (11) the anticipated benefits of diversification and balance of operations across product lines, regions and industries; (12) the outcome of legal proceedings, investigations and other contingencies; (13) pension plan assumptions and future contributions; (14) the impact of the negotiation of collective bargaining agreements and labor disputes; (15) the effect of changes in political conditions in the U.S. and other countries in which United Technologies and Rockwell Collins operate, including the effect of changes in U.S. trade policies or the U.K.'s pending withdrawal from the EU, on general market conditions, global trade policies and currency exchange rates in the near term and beyond; (16) the effect of changes in tax (including U.S. tax reform enacted on December 22, 2017, which is commonly referred to as the Tax Cuts and Jobs Act of 2017), environmental, regulatory (including among other things import / export) and other laws and regulations in the U.S. and other countries in which United Technologies and Rockwell Collins operate; (17) the ability of United Technologies and Rockwell Collins to receive the required regulatory approvals (and the risk that such approvals may result in the imposition of conditions that could adversely affect the combined company or the expected benefits of the merger) and to satisfy the other conditions to the closing of the pending acquisition on a timely basis or at all; (18) the occurrence of events that may give rise to a right of one or both of United Technologies or Rockwell Collins to terminate the merger agreement, including in circumstances that might require Rockwell Collins to pay a termination fee of $ 695 million to United Technologies or $ 50 million of expense reimbursement; (19) negative effects of the announcement or the completion of the merger on the market price of United Technologies» and / or Rockwell Collins» common stock and / or on their respective financial performance; (20) risks related to Rockwell Collins and United Technologies being restricted in their operation of their businesses while the merger agreement is in effect; (21) risks relating to the value of the United Technologies» shares to be issued in connection with the pending Rockwell acquisition, significant merger costs and / or unknown liabilities; (22) risks associated with third party contracts containing consent and / or other provisions that may be triggered by the Rockwell merger agreement; (23) risks associated with merger - related litigation or appraisal proceedings; and (24) the ability of United Technologies and Rockwell Collins, or the combined company, to retain and hire key personnel.
By using a cryptographic key, distributed ledgers can track changes in their databases no matter what servers they are stored on, or even split between.
Cancel the «cookie - cutter» approach to training your sales force and optimize your talent by using these five key steps.
Because social media is used by much of the U.S. population in most age groups and continues to grow in popularity globally, having an online presence is key.
The New Plastics Economy presents three key platforms: creating an effective after - use plastics economy by improving global recycling efforts, reducing the leakage of plastic waste into the environment, and decoupling plastic from the fossil fuels used to create it.
FRANKFURT, April 17 (Reuters)- More than 100 parts for U.S. space agency NASA's deep - space capsule Orion will be made by 3D printers, using technology that experts say will eventually become key to efforts to send humans to Mars.
By leveraging technologies such as radio frequency identification (RFID) tags to drive inventory transparency (a key tenet of omnichannel success), Lululemon uses stores as distribution centers to optimize the supply chain and improve inventory turns while enabling an elevated in - store experience for educators and guests.
This can be accomplished with most regular web browsers by going into «private» mode, where cookies and history are not recorded, but the difference with SurfEasy is that such information is tracked and stored on the USB key, which means you can take it with you and use it on different computers.
So, seek out those conversations using social - listening software, or by following key brands in your space or even by using the search feature that most social platforms offer.
The friendly deal, which requires approval by US Cobalt shareholders, comes as growing investments and demand in electric vehicles has spurred interest in key metals like cobalt, used in the vehicle's battery packs.
The growing use of ETFs by institutions is a key part of that self - reinforcing feedback loop.
Unions in the utility industry, health care and manufacturing industries are using knowledge and skills as the key source of worker power by expanding apprenticeship training, creating partnership with community colleges, vocational schools, and employers to fill the «middle skills» gaps that exist today or will grow as skilled baby boomers retire.
But the Google (googl) researchers, followed by several teams in academia, had found ways to trick chips into revealing data like passwords and encryption keys as the secrets were used in the speculative execution calculations.
Simply by adding two click triggers — one an anxiety - reducer about credit cards, the other a key benefit of the solution — FriendBuy now sees 134 signups for every 100 it used to see.
The keys are smuggled into Mexico and then on to the United States — by land, air, or sea — using methods as varied as they are ingenious: stashed under fresh produce, in cans of jalapeños, in the bellies of frozen shark carcasses, in trap compartments of cars, trucks, motor homes, container ships, small aircraft, even submarines; taped to the bodies of backpackers traveling by bus; catapulted over border fences; concealed in the trunks of corrupt local sheriffs; or trundled through underground tunnels (some so well constructed that they have air conditioning), a tactic purportedly devised by El Chapo himself.
Additionally, adjusted EBITDA is a key financial measure used by the compensation committee of our board of directors in connection with the payment of bonuses to our executive officers.
We have included adjusted EBITDA in this prospectus because it is a key measure used by our management and board of directors to understand and evaluate our core operating performance and trends, to prepare and approve our annual budget and to develop short - and long - term operational plans.
Cambridge Analytica is a shady company owned by the British firm SCL Group — and, reportedly, in part by the right - wing - funding Mercer family — which claimed it could build models that identify persuadable voters by using six key personality types.
IDRs enable corporate issuers to review the key data points used by Glass Lewis in its analysis prior to a full Proxy Paper research report being published for institutional investor clients.
Accordingly, we believe that adjusted EBITDA provides useful information to investors and others in understanding and evaluating our operating results, enhancing the overall understanding of our past performance and future prospects, and allowing for greater transparency with respect to a key financial metric used by our management in its financial and operational decision - making.
I have done it a few different ways and now as I don't have as much time, it makes more sense to use a turn - key system done by a power team that does this everyday.
The NSA seeks to defeat encryption through a variety of means, including by obtaining encryption «keys» to decode communications, by using super-computers to break codes, and by influencing encryption standards to make them more vulnerable to outside attack, according to reports Thursday by the New York Times, the Guardian and ProPublica, based on documents provided by former NSA contractor Edward Snowden.
The smartphone market is seen as a key battleground by computer and mobile phone firms, because it is expected to become the dominant means by which people use the internet in the near future.
If I asked ten members of your family how they would describe you, they would describe you by using a few key words.
The system would accomplish this, in part, by using blockchain technology, private key encryption, and zero - knowledge proofs.
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry (R) World (TM); risks related to the collection, storage, transmission, use and disclosure of confidential and personal information;
Many factors could cause BlackBerry's actual results, performance or achievements to differ materially from those expressed or implied by the forward - looking statements, including, without limitation: BlackBerry's ability to enhance its current products and services, or develop new products and services in a timely manner or at competitive prices, including risks related to new product introductions; risks related to BlackBerry's ability to mitigate the impact of the anticipated decline in BlackBerry's infrastructure access fees on its consolidated revenue by developing an integrated services and software offering; intense competition, rapid change and significant strategic alliances within BlackBerry's industry; BlackBerry's reliance on carrier partners and distributors; risks associated with BlackBerry's foreign operations, including risks related to recent political and economic developments in Venezuela and the impact of foreign currency restrictions; risks relating to network disruptions and other business interruptions, including costs, potential liabilities, lost revenues and reputational damage associated with service interruptions; risks related to BlackBerry's ability to implement and to realize the anticipated benefits of its CORE program; BlackBerry's ability to maintain or increase its cash balance; security risks; BlackBerry's ability to attract and retain key personnel; risks related to intellectual property rights; BlackBerry's ability to expand and manage BlackBerry ® World ™; risks related to the collection, storage, transmission, use and disclosure of confidential and personal information; BlackBerry's ability to manage inventory and asset risk; BlackBerry's reliance on suppliers of functional components for its products and risks relating to its supply chain; BlackBerry's ability to obtain rights to use software or components supplied by third parties; BlackBerry's ability to successfully maintain and enhance its brand; risks related to government regulations, including regulations relating to encryption technology; BlackBerry's ability to continue to adapt to recent board and management changes and headcount reductions; reliance on strategic alliances with third - party network infrastructure developers, software platform vendors and service platform vendors; BlackBerry's reliance on third - party manufacturers; potential defects and vulnerabilities in BlackBerry's products; risks related to litigation, including litigation claims arising from BlackBerry's practice of providing forward - looking guidance; potential charges relating to the impairment of intangible assets recorded on BlackBerry's balance sheet; risks as a result of actions of activist shareholders; government regulation of wireless spectrum and radio frequencies; risks related to economic and geopolitical conditions; risks associated with acquisitions; foreign exchange risks; and difficulties in forecasting BlackBerry's financial results given the rapid technological changes, evolving industry standards, intense competition and short product life cycles that characterize the wireless communications industry.
Of course it is not the only data generated by messaging: entailed in the ease - of - use that comes from relying on centralized servers for key exchange is the necessary collection by those servers of metadata.
The key for such new wave of EVs is a magnet for electric motors developed by the Japanese firm, which halves the use of a rare earth called neodymium and eliminates the use of others called terbium and dysprosium, the company revealed on Tuesday.
It may be used as a funding mechanism for your buy - sell agreement and as business interruption insurance to pay the business for interruptions caused by the death of key employees.
«At least one unspent output (UTXO); and metadata comprising an identifier indicative of the location where the contract is stored; and renewing or rolling the contract on by: generating a new key using data relating to a previous key associated with the contract; generating a script comprising the new key, the location of the contract and a hash of the contract; and paying an amount of currency to the script.»
Exit strategies are used by virtually all finance professionals and are a key component to successful trades.
Protect yourself by: Using strong encryption with any method of storing your keys and push the assets to offline storage after each transaction.
a b c d e f g h i j k l m n o p q r s t u v w x y z