155,747 research outputs found

    Safe Harbors for Quantity Discounts and Bundling

    Get PDF
    The courts and analysts continue to struggle to articulate safe harbors for a wide variety of common business pricing practices in which either a single product is sold at a discount if purchased in bulk or in which multiple products are bundled together at prices different from the ones that would emerge if the products were purchased separately. The phenomenon of tying in which the sale of one product is conditioned on the purchase of another is closely related to bundling. Its analysis relies on the same economics as that used to analyze bundling (see, e.g., Carlton and Waldman (2008)), though the law seems to make a distinction between the two. The need for safe harbors for common business pricing practices arises from the recognition that these practices often are motivated by efficiency and that a broad antitrust attack on them could cause more harm than good. In this essay, we analyze and propose safe harbors for quantity discounts and bundled products. In analyzing the latter case, we discuss the deficiencies of the particular safe harbor proposed in the report of the Antitrust Modernization Commission (2007) (AMC) of which Carlton was a member.Tying, Bundling, Safe Harbor, Antitrust

    The marginated pool

    Get PDF
    The pulmonary circulation harbors a large intravascular reservoir of leukocytes refered to as the Marginated Pool. This marginated pool is balanced by propeling and retaining forces acting on leukocytes during their passage through the pulmonary circulation. The present paper discusses these factors and their underlying mechanisms. Copyright (C) 2002 S. Karger AG, Basel

    Draft genome sequence of the naphthalene degrader Herbaspirillum sp. strain RV1423

    Get PDF
    Herbaspirillum sp. strain RV1423 was isolated from a site contaminated with alkanes and aromatic compounds and harbors the complete pathway for naphthalene degradation. The new features found in RV1423 increase considerably the versatility and the catabolic potential of a genus of bacteria previously considered mainly to be diazotrophic endophytes to plants

    Harbors and Navigation (Control of Harbors) Amendment Act, 2000, No. 81

    Get PDF

    Newsgroups Float Into Safe Harbor, and Copyright Holders Are Sunk

    Get PDF
    Usenet newsgroups are swiftly becoming a popular vehicle for pirating digital music, movies, books, and other copyrighted works. Meanwhile, courts ignore Usenet’s tremendous potential for copyright infringement. In Ellison v. Robertson, the Ninth Circuit Court of Appeals found that America Online’s Usenet service might qualify for safe harbor under the Digital Millennium Copyright Act. According to the district court below, safe harbor would preclude a finding of secondary copyright infringement against America Online. However, the courts misinterpreted the safe harbor provisions. One safe harbor provision was misapplied and another was ignored altogether. This iBrief critiques the Ellison opinions and analyzes the application of the safe harbor provisions to Usenet operators

    Mega, Digital Storage Lockers, and the DMCA: Will Innovation Be Stifled by Fears of Piracy?

    Get PDF
    Kim Dotcom, founder of Megaupload Limited, has been in many news headlines over the past year. Megaupload—one of Dotcom’s many peer-to-peer sharing sites—was the center of controversy, as it allowed users to upload and share all sorts of files, including copyrighted material. After an organized effort by the Department of Justice and several foreign governments, Dotcom was arrested for (secondary) copyright infringement and his site was ultimately shut down. Dotcom has recently launched a new service, MEGA, which he claims will evade copyright laws entirely. Like other well-known cloud-sharing services such as Dropbox and Google Drive, MEGA allows users to upload files and to share them with select users. In an attempt to avoid liability, MEGA locally encrypts all files on the user’s computer before they are uploaded to the site. The private key and public key used to encrypt and decrypt the file are retained solely by the user; MEGA gets no part of that information. This, Dotcom argues, will shift the entirety of the copyright onus to the user. This Issue Brief analyzes the protections afforded cyberlocker services like MEGA by the DMCA, including tensions raised in actual litigation. This Issue Brief argues that, while an ex ante secondary-liability analysis is difficult due to its contextual nature, MEGA’s use of user-controlled encryption (UCE), deduplication, and distributed host servers may lend to an affirmative finding of liability

    USING PRIMARY AND SECONDARY DATA TO CONSTRUCT AN INPUT-OUTPUT TABLE--A CASE STUDY OF FOUR CITIES IN NORTHEASTERN MINNESOTA AND DOUGLAS COUNTY, WISCONSIN

    Get PDF
    The purpose of this paper is report on the construction of the thirty-five sector input-output table which represents the interindustry flows in a four-city area. The incorporated areas of the cities of Duluth, Two Harbors, and Cloquet in Minnesota, and Superior in Wisconsin are included in the study.Community/Rural/Urban Development,
    corecore