155,747 research outputs found
Safe Harbors for Quantity Discounts and Bundling
The courts and analysts continue to struggle to articulate safe harbors for a wide variety of common business pricing practices in which either a single product is sold at a discount if purchased in bulk or in which multiple products are bundled together at prices different from the ones that would emerge if the products were purchased separately. The phenomenon of tying in which the sale of one product is conditioned on the purchase of another is closely related to bundling. Its analysis relies on the same economics as that used to analyze bundling (see, e.g., Carlton and Waldman (2008)), though the law seems to make a distinction between the two. The need for safe harbors for common business pricing practices arises from the recognition that these practices often are motivated by efficiency and that a broad antitrust attack on them could cause more harm than good. In this essay, we analyze and propose safe harbors for quantity discounts and bundled products. In analyzing the latter case, we discuss the deficiencies of the particular safe harbor proposed in the report of the Antitrust Modernization Commission (2007) (AMC) of which Carlton was a member.Tying, Bundling, Safe Harbor, Antitrust
The marginated pool
The pulmonary circulation harbors a large intravascular reservoir of leukocytes refered to as the Marginated Pool. This marginated pool is balanced by propeling and retaining forces acting on leukocytes during their passage through the pulmonary circulation. The present paper discusses these factors and their underlying mechanisms. Copyright (C) 2002 S. Karger AG, Basel
Draft genome sequence of the naphthalene degrader Herbaspirillum sp. strain RV1423
Herbaspirillum sp. strain RV1423 was isolated from a site contaminated with alkanes and aromatic compounds and harbors the complete pathway for naphthalene degradation. The new features found in RV1423 increase considerably the versatility and the catabolic potential of a genus of bacteria previously considered mainly to be diazotrophic endophytes to plants
Metagenome sequencing of the microbial community of a solar saltern crystallizer pond at cáhuil lagoon, chile.
Cáhuil Lagoon in central Chile harbors distinct microbial communities in various solar salterns that are arranged as interconnected ponds with increasing salt concentrations. Here, we report the metagenome of the 3.0- to 0.2-µm fraction of the microbial community present in a crystallizer pond with 34% salinity
Newsgroups Float Into Safe Harbor, and Copyright Holders Are Sunk
Usenet newsgroups are swiftly becoming a popular vehicle for pirating digital music, movies, books, and other copyrighted works. Meanwhile, courts ignore Usenet’s tremendous potential for copyright infringement. In Ellison v. Robertson, the Ninth Circuit Court of Appeals found that America Online’s Usenet service might qualify for safe harbor under the Digital Millennium Copyright Act. According to the district court below, safe harbor would preclude a finding of secondary copyright infringement against America Online. However, the courts misinterpreted the safe harbor provisions. One safe harbor provision was misapplied and another was ignored altogether. This iBrief critiques the Ellison opinions and analyzes the application of the safe harbor provisions to Usenet operators
Mega, Digital Storage Lockers, and the DMCA: Will Innovation Be Stifled by Fears of Piracy?
Kim Dotcom, founder of Megaupload Limited, has been in many news headlines over the past year. Megaupload—one of Dotcom’s many peer-to-peer sharing sites—was the center of controversy, as it allowed users to upload and share all sorts of files, including copyrighted material. After an organized effort by the Department of Justice and several foreign governments, Dotcom was arrested for (secondary) copyright infringement and his site was ultimately shut down. Dotcom has recently launched a new service, MEGA, which he claims will evade copyright laws entirely. Like other well-known cloud-sharing services such as Dropbox and Google Drive, MEGA allows users to upload files and to share them with select users. In an attempt to avoid liability, MEGA locally encrypts all files on the user’s computer before they are uploaded to the site. The private key and public key used to encrypt and decrypt the file are retained solely by the user; MEGA gets no part of that information. This, Dotcom argues, will shift the entirety of the copyright onus to the user. This Issue Brief analyzes the protections afforded cyberlocker services like MEGA by the DMCA, including tensions raised in actual litigation. This Issue Brief argues that, while an ex ante secondary-liability analysis is difficult due to its contextual nature, MEGA’s use of user-controlled encryption (UCE), deduplication, and distributed host servers may lend to an affirmative finding of liability
USING PRIMARY AND SECONDARY DATA TO CONSTRUCT AN INPUT-OUTPUT TABLE--A CASE STUDY OF FOUR CITIES IN NORTHEASTERN MINNESOTA AND DOUGLAS COUNTY, WISCONSIN
The purpose of this paper is report on the construction of the thirty-five sector input-output table which represents the interindustry flows in a four-city area. The incorporated areas of the cities of Duluth, Two Harbors, and Cloquet in Minnesota, and Superior in Wisconsin are included in the study.Community/Rural/Urban Development,
Internet Packet Sniffing and Its Impact on the Network Neutrality Debate and the Balance of Power Between Intellectual Property Creators and Consumers
- …
