1,169 research outputs found

    Behind Enemy Phone Lines: Insider Trading, Parallel Enforcement, and Sharing the Fruits of Wiretaps

    Get PDF
    Two key trends were present in the successful prosecution of Raj Rajaratnam and his coconspirators in one of the largest insider-trading conspiracies in history: the use of wiretaps to investigate and prosecute insider trading and a joint effort between the Department of Justice (DOJ) and the Securities & Exchange Commission (SEC) to conduct the investigation. Despite the close working relationship between the DOJ and the SEC, the DOJ never disclosed the fruits of the wiretaps to the SEC, presumably due to its belief that Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (as amended, the “Wiretap Act”)—the comprehensive framework that authorizes the government to conduct wiretaps in certain circumstances—prohibited it from doing so. Though the Second Circuit in SEC v. Rajaratnam ultimately held that the SEC could obtain wiretap materials from the criminal defendants as part of civil discovery, the question of whether direct disclosure of the wiretap materials from the DOJ to the SEC is prohibited has been raised but not yet addressed. This Note analyzes previous cases addressing the construction of the Wiretap Act’s disclosure provisions and concludes that direct disclosure from the DOJ to the SEC is not prohibited by the Act. It further proposes a process by which civil enforcement agencies, such as the SEC, can request disclosure of wiretap materials through the DOJ in such a way that balances the benefits of disclosure against the privacy interests of the parties whose conversations were intercepted

    Social Determinants of Health and What Mothers Say They Need and Want After Release From Jail.

    Get PDF
    Identifying the biopsychosocial needs of mothers who have been released from jail is critical to understanding the best ways to support their health and stability after release. In May through August 2014, we interviewed 15 mothers who had been released from an urban jail about their reentry experiences, and we analyzed transcripts for themes. Eight domains of community reentry emerged through analysis: behavioral health services, education, employment, housing, material resources, medical care, relationships with children, and social support. Participants defined barriers to successful reentry, which paralleled the social determinants of health, and shared suggestions that could be used to mitigate these barriers

    2 P2P or Not 2 P2P?

    Full text link
    In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.Comment: 6 pages, 1 figur

    Cicada: Predictive Guarantees for Cloud Network Bandwidth

    Get PDF
    In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know what bandwidth guarantees they want. However, application bandwidth demands can be complex and time-varying, and many tenants might lack sufficient information to request a bandwidth guarantee that is well-matched to their needs. A tenant's lack of accurate knowledge about its future bandwidth demands can lead to over-provisioning (and thus reduced cost-efficiency) or under-provisioning (and thus poor user experience in latency-sensitive user-facing applications). We analyze traffic traces gathered over six months from an HP Cloud Services datacenter, finding that application bandwidth consumption is both time-varying and spatially inhomogeneous. This variability makes it hard to predict requirements. To solve this problem, we develop a prediction algorithm usable by a cloud provider to suggest an appropriate bandwidth guarantee to a tenant. The key idea in the prediction algorithm is to treat a set of previously observed traffic matrices as "experts" and learn online the best weighted linear combination of these experts to make its prediction. With tenant VM placement using these predictive guarantees, we find that the inter-rack network utilization in certain datacenter topologies can be more than doubled

    Ordered Nanostructures Made Using Chaperonin Polypeptides

    Get PDF
    A recently invented method of fabricating periodic or otherwise ordered nanostructures involves the use of chaperonin polypeptides. The method is intended to serve as a potentially superior and less expensive alternative to conventional lithographic methods for use in the patterning steps of the fabrication of diverse objects characterized by features of the order of nanometers. Typical examples of such objects include arrays of quantum dots that would serve as the functional building blocks of future advanced electronic and photonic devices. A chaperonin is a double-ring protein structure having a molecular weight of about 60 plus or minus 5 kilodaltons. In nature, chaperonins are ubiquitous, essential, subcellular structures. Each natural chaperonin molecule comprises 14, 16, or 18 protein subunits, arranged as two stacked rings approximately 16 to 18 nm tall by approximately 15 to 17 nm wide, the exact dimensions depending on the biological species in which it originates. The natural role of chaperonins is unknown, but they are believed to aid in the correct folding of other proteins, by enclosing unfolded proteins and preventing nonspecific aggregation during assembly. What makes chaperonins useful for the purpose of the present method is that under the proper conditions, chaperonin rings assemble themselves into higher-order structures. This method exploits such higher-order structures to define nanoscale devices. The higher-order structures are tailored partly by choice of chemical and physical conditions for assembly and partly by using chaperonins that have been mutated. The mutations are made by established biochemical techniques. The assembly of chaperonin polypeptides into such structures as rings, tubes, filaments, and sheets (two-dimensional crystals) can be regulated chemically. Rings, tubes, and filaments of some chaperonin polypeptides can, for example, function as nano vessels if they are able to absorb, retain, protect, and release gases or chemical reagents, including reagents of medical or pharmaceutical interest. Chemical reagents can be bound in, or released from, such structures under suitable controlled conditions. In an example of a contemplated application, a two-dimensional crystal of chaperonin polypeptides would be formed on a surface of an inorganic substrate and used to form a planar array of nanoparticles or quantum dots. Through genetic engineering of the organisms used to manufacture the chaperonins, specific sites on the chaperonin molecules and, thus, on the two-dimensional crystals can be chemically modified to react in a specific manner so as to favor the deposition of the material of the desired nanoparticles or quantum dots. A mutation that introduces a cysteine residue at the desired sites on a chaperonin of Sulfolobus shibatae was used to form planar arrays of gold nanoparticles (see figure)

    High-performance network traffic processing systems using commodity hardware

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-36784-7_1The Internet has opened new avenues for information ac- cessing and sharing in a variety of media formats. Such popularity has resulted in an increase of the amount of resources consumed in backbone links, whose capacities have witnessed numerous upgrades to cope with the ever-increasing demand for bandwidth. Consequently, network tra c processing at today's data transmission rates is a very demanding task, which has been traditionally accomplished by means of specialized hard- ware tailored to speci c tasks. However, such approaches lack either of exibility or extensibility|or both. As an alternative, the research com- munity has pointed to the utilization of commodity hardware, which may provide exible and extensible cost-aware solutions, ergo entailing large reductions of the operational and capital expenditure investments. In this chapter, we provide a survey-like introduction to high-performance network tra c processing using commodity hardware. We present the required background to understand the di erent solutions proposed in the literature to achieve high-speed lossless packet capture, which are reviewed and compared

    The Power of Social Media in Political Movements: How Teens Are Shaping Democracy Online

    Get PDF
    The use of social media by teens in political movements is reshaping how democracy functions. By utilizing these platforms, young people are holding politicians and institutions accountable in real-time. Social media provides a direct channel for them to question authority and influence public opinion. Politicians are increasingly paying attention to these digital conversations, recognizing the power of youth-driven movements to sway elections and policy decisions. This research addresses the following questions: How do teenagers use social media platforms for political activism? What are the unique characteristics of teen-led movements online? How do they compare to traditional forms of activism? The power of social media in political movements lies in its ability to give a voice to the next generation. Teenagers are proving that age is not a barrier to making a difference, and their innovative use of social media is inspiring millions to care about issues that shape our world.https://orb.binghamton.edu/research_days_posters_2025/1123/thumbnail.jp
    • …
    corecore