6,907 research outputs found

    The First Amendment as Killer App

    Get PDF
    While it is a commonplace that the Internet revolutionized speech, what is perhaps less well understood is that free speech made today’s Internet. Symposium article

    The History of the iPad

    Get PDF
    The purpose of this paper is to review the history of the iPad and its influence over contemporary computing. Although the iPad is relatively new, the tablet computer is having a long and lasting affect on how we communicate. With this essay, I attempt to review the technologies that emerged and converged to create the tablet computer. Of course, Apple and its iPad are at the center of this new computing movement

    Report of the Stanford Linked Data Workshop

    No full text
    The Stanford University Libraries and Academic Information Resources (SULAIR) with the Council on Library and Information Resources (CLIR) conducted at week-long workshop on the prospects for a large scale, multi-national, multi-institutional prototype of a Linked Data environment for discovery of and navigation among the rapidly, chaotically expanding array of academic information resources. As preparation for the workshop, CLIR sponsored a survey by Jerry Persons, Chief Information Architect emeritus of SULAIR that was published originally for workshop participants as background to the workshop and is now publicly available. The original intention of the workshop was to devise a plan for such a prototype. However, such was the diversity of knowledge, experience, and views of the potential of Linked Data approaches that the workshop participants turned to two more fundamental goals: building common understanding and enthusiasm on the one hand and identifying opportunities and challenges to be confronted in the preparation of the intended prototype and its operation on the other. In pursuit of those objectives, the workshop participants produced:1. a value statement addressing the question of why a Linked Data approach is worth prototyping;2. a manifesto for Linked Libraries (and Museums and Archives and …);3. an outline of the phases in a life cycle of Linked Data approaches;4. a prioritized list of known issues in generating, harvesting & using Linked Data;5. a workflow with notes for converting library bibliographic records and other academic metadata to URIs;6. examples of potential “killer apps” using Linked Data: and7. a list of next steps and potential projects.This report includes a summary of the workshop agenda, a chart showing the use of Linked Data in cultural heritage venues, and short biographies and statements from each of the participants

    Shockingly Evil: The Cruel Invasive Appropriation and Exploitation of Victims\u27 Rights of Publicity in the True Crime Genre

    Full text link
    America\u27s obsession with the true crime genre has evoked an explosion in volume and variety of recreations of the country\u27s most prolific crimes. The never-ending re-enactments constantly barrage the victims and family members of those who suffered at the hands of the killers. The nightmare of the crimes they already endured never cease, as victims are forced to relive their worst torments via movies, television shows, and podcasts discussing the crimes. Producers and directors are currently free to appropriate and capitalize off of individuals\u27 images without so much as a consultation. From dramatic depictions by actors to docuseries evaluations of the real crime footage, Hollywood is exploiting the names and personhood of crime victims in order to profit. As the law currently stands, directors are incentivized to further injure extremely vulnerable and traumatized individuals. States need to recognize a universal right of publicity that allows for appropriated victims to enforce against those impermissibly using their identities. With the everchanging media landscape, the law must evolve to compensate for injuries never previously imagined. As the true crime genre continues to expand, so too must the rights available to protect the injured victims\u27 stores and trauma that they hope to exploit

    Internet: The Mainstreaming of Online Life

    Get PDF
    Presents findings from a survey that examines the widespread adoption of the Internet in the past decade, and its dramatic impact on communication patterns and on the way Americans seek information

    DNA Dragnet Practices: Are They Constitutional

    Get PDF

    Technology Mergers and the Market for Corporate Control

    Get PDF
    Several high-profile academic articles and reports claim to have identified important gaps in current merger enforcement rules, particularly with respect to tech and pharma acquisitions involving nascent and potential competitors—so-called “killer acquisitions” and “kill zones.” As a result of these perceived deficiencies, scholars and enforcers have called for tougher rules, including the introduction of lower merger filing thresholds and substantive changes, such as the inversion of the burden of proof when authorities review mergers and acquisitions in the digital platform industry. Meanwhile, and seemingly in response to the increased political and advocacy pressures around the issue, U.S. antitrust enforcers have recently undertaken several enforcement actions directly targeting such acquisitions. As this paper discusses, however, these proposals tend to overlook the important tradeoffs that would ensue from attempts to decrease the number of false positives under existing merger rules and thresholds. While merger enforcement ought to be mindful of these possible theories of harm, the theories and evidence are not nearly as robust as many proponents suggest. Most importantly, there is insufficient basis to conclude that the costs of permitting the behavior they identify is greater than the costs would be of increasing enforcement to prohibit it
    • …
    corecore