1,169 research outputs found
Behind Enemy Phone Lines: Insider Trading, Parallel Enforcement, and Sharing the Fruits of Wiretaps
Two key trends were present in the successful prosecution of Raj Rajaratnam and his coconspirators in one of the largest insider-trading conspiracies in history: the use of wiretaps to investigate and prosecute insider trading and a joint effort between the Department of Justice (DOJ) and the Securities & Exchange Commission (SEC) to conduct the investigation. Despite the close working relationship between the DOJ and the SEC, the DOJ never disclosed the fruits of the wiretaps to the SEC, presumably due to its belief that Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (as amended, the “Wiretap Act”)—the comprehensive framework that authorizes the government to conduct wiretaps in certain circumstances—prohibited it from doing so.
Though the Second Circuit in SEC v. Rajaratnam ultimately held that the SEC could obtain wiretap materials from the criminal defendants as part of civil discovery, the question of whether direct disclosure of the wiretap materials from the DOJ to the SEC is prohibited has been raised but not yet addressed. This Note analyzes previous cases addressing the construction of the Wiretap Act’s disclosure provisions and concludes that direct disclosure from the DOJ to the SEC is not prohibited by the Act. It further proposes a process by which civil enforcement agencies, such as the SEC, can request disclosure of wiretap materials through the DOJ in such a way that balances the benefits of disclosure against the privacy interests of the parties whose conversations were intercepted
Social Determinants of Health and What Mothers Say They Need and Want After Release From Jail.
Identifying the biopsychosocial needs of mothers who have been released from jail is critical to understanding the best ways to support their health and stability after release. In May through August 2014, we interviewed 15 mothers who had been released from an urban jail about their reentry experiences, and we analyzed transcripts for themes. Eight domains of community reentry emerged through analysis: behavioral health services, education, employment, housing, material resources, medical care, relationships with children, and social support. Participants defined barriers to successful reentry, which paralleled the social determinants of health, and shared suggestions that could be used to mitigate these barriers
2 P2P or Not 2 P2P?
In the hope of stimulating discussion, we present a heuristic decision tree
that designers can use to judge the likely suitability of a P2P architecture
for their applications. It is based on the characteristics of a wide range of
P2P systems from the literature, both proposed and deployed.Comment: 6 pages, 1 figur
Cicada: Predictive Guarantees for Cloud Network Bandwidth
In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know what bandwidth guarantees they want. However, application bandwidth demands can be complex and time-varying, and many tenants might lack sufficient information to request a bandwidth guarantee that is well-matched to their needs. A tenant's lack of accurate knowledge about its future bandwidth demands can lead to over-provisioning (and thus reduced cost-efficiency) or under-provisioning (and thus poor user experience in latency-sensitive user-facing applications). We analyze traffic traces gathered over six months from an HP Cloud Services datacenter, finding that application bandwidth consumption is both time-varying and spatially inhomogeneous. This variability makes it hard to predict requirements. To solve this problem, we develop a prediction algorithm usable by a cloud provider to suggest an appropriate bandwidth guarantee to a tenant. The key idea in the prediction algorithm is to treat a set of previously observed traffic matrices as "experts" and learn online the best weighted linear combination of these experts to make its prediction. With tenant VM placement using these predictive guarantees, we find that the inter-rack network utilization in certain datacenter topologies can be more than doubled
Ordered Nanostructures Made Using Chaperonin Polypeptides
A recently invented method of fabricating periodic or otherwise ordered nanostructures involves the use of chaperonin polypeptides. The method is intended to serve as a potentially superior and less expensive alternative to conventional lithographic methods for use in the patterning steps of the fabrication of diverse objects characterized by features of the order of nanometers. Typical examples of such objects include arrays of quantum dots that would serve as the functional building blocks of future advanced electronic and photonic devices. A chaperonin is a double-ring protein structure having a molecular weight of about 60 plus or minus 5 kilodaltons. In nature, chaperonins are ubiquitous, essential, subcellular structures. Each natural chaperonin molecule comprises 14, 16, or 18 protein subunits, arranged as two stacked rings approximately 16 to 18 nm tall by approximately 15 to 17 nm wide, the exact dimensions depending on the biological species in which it originates. The natural role of chaperonins is unknown, but they are believed to aid in the correct folding of other proteins, by enclosing unfolded proteins and preventing nonspecific aggregation during assembly. What makes chaperonins useful for the purpose of the present method is that under the proper conditions, chaperonin rings assemble themselves into higher-order structures. This method exploits such higher-order structures to define nanoscale devices. The higher-order structures are tailored partly by choice of chemical and physical conditions for assembly and partly by using chaperonins that have been mutated. The mutations are made by established biochemical techniques. The assembly of chaperonin polypeptides into such structures as rings, tubes, filaments, and sheets (two-dimensional crystals) can be regulated chemically. Rings, tubes, and filaments of some chaperonin polypeptides can, for example, function as nano vessels if they are able to absorb, retain, protect, and release gases or chemical reagents, including reagents of medical or pharmaceutical interest. Chemical reagents can be bound in, or released from, such structures under suitable controlled conditions. In an example of a contemplated application, a two-dimensional crystal of chaperonin polypeptides would be formed on a surface of an inorganic substrate and used to form a planar array of nanoparticles or quantum dots. Through genetic engineering of the organisms used to manufacture the chaperonins, specific sites on the chaperonin molecules and, thus, on the two-dimensional crystals can be chemically modified to react in a specific manner so as to favor the deposition of the material of the desired nanoparticles or quantum dots. A mutation that introduces a cysteine residue at the desired sites on a chaperonin of Sulfolobus shibatae was used to form planar arrays of gold nanoparticles (see figure)
High-performance network traffic processing systems using commodity hardware
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-36784-7_1The Internet has opened new avenues for information ac-
cessing and sharing in a variety of media formats. Such popularity has
resulted in an increase of the amount of resources consumed in backbone
links, whose capacities have witnessed numerous upgrades to cope with
the ever-increasing demand for bandwidth. Consequently, network tra c
processing at today's data transmission rates is a very demanding task,
which has been traditionally accomplished by means of specialized hard-
ware tailored to speci c tasks. However, such approaches lack either of
exibility or extensibility|or both. As an alternative, the research com-
munity has pointed to the utilization of commodity hardware, which may
provide
exible and extensible cost-aware solutions, ergo entailing large
reductions of the operational and capital expenditure investments. In
this chapter, we provide a survey-like introduction to high-performance
network tra c processing using commodity hardware. We present the
required background to understand the di erent solutions proposed in
the literature to achieve high-speed lossless packet capture, which are
reviewed and compared
The Power of Social Media in Political Movements: How Teens Are Shaping Democracy Online
The use of social media by teens in political movements is reshaping how democracy functions. By utilizing these platforms, young people are holding politicians and institutions accountable in real-time. Social media provides a direct channel for them to question authority and influence public opinion. Politicians are increasingly paying attention to these digital conversations, recognizing the power of youth-driven movements to sway elections and policy decisions. This research addresses the following questions: How do teenagers use social media platforms for political activism? What are the unique characteristics of teen-led movements online? How do they compare to traditional forms of activism? The power of social media in political movements lies in its ability to give a voice to the next generation. Teenagers are proving that age is not a barrier to making a difference, and their innovative use of social media is inspiring millions to care about issues that shape our world.https://orb.binghamton.edu/research_days_posters_2025/1123/thumbnail.jp
The Dykier, the Butcher, the Better: The State\u27s Use of Homophobia and Sexism to Execute Women in the United States
- …