New York University Annual Survey of American Law New York of American Law University Annual Survey

Total Page:16

File Type:pdf, Size:1020Kb

New York University Annual Survey of American Law New York of American Law University Annual Survey nys69-2_cv_nys69-2_cv 9/22/2014 8:41 AM Page 2 (trap 04 plate) Vol. 69 No. 2 Vol. New York University Annual Survey of American Law New York University Annual Survey of American Law New York ARTICLES TOWARD ADEQUACY Sarah L. Brinton SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND THEORETICAL APPROACHES Joseph M. Eno 2013 Volume 69 Issue 2 2013 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 1 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW VOLUME 69 ISSUE 2 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 NEW YORK UNIVERSITY SCHOOL OF LAW ARTHUR T. VANDERBILT HALL Washington Square New York City 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 2 23-OCT-14 9:10 New York University Annual Survey of American Law is in its seventy-first year of publication. L.C. Cat. Card No.: 46-30523 ISSN 0066-4413 All Rights Reserved New York University Annual Survey of American Law is published quarterly at 110 West 3rd Street, New York, New York 10012. Subscription price: $30.00 per year (plus $4.00 for foreign mailing). Single issues are available at $16.00 per issue (plus $1.00 for foreign mailing). For regular subscriptions or single issues, contact the Annual Survey editorial office. Back issues may be ordered directly from William S. Hein & Co., Inc., by mail (1285 Main St., Buffalo, NY 14209-1987), phone (800- 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 828-7571), fax (716-883-8100), or email ([email protected]). Back issues are also available in PDF format through HeinOnline (http://heinonline.org). All works copyright © 2013 by the author, except when otherwise expressly indicated. For permission to reprint an article or any portion thereof, please address your written request to the New York University Annual Survey of American Law. Copyright: Except as otherwise provided, the author of each article in this issue has granted permission for copies of that article to be made for classroom use, provided that: (1) copies are distributed to students at or below cost; (2) the author and journal are identified on each copy; and (3) proper notice of copyright is affixed to each copy. Manuscripts: The Annual Survey invites the submission of unsolicited manuscripts. Text and citations should conform to the 19th edition of A Uniform System of Citation. Please enclose an envelope with return postage if you would like your manuscript returned after consideration. Editorial Office: 110 West 3rd Street, New York, N.Y. 10012 (212) 998-6540 (212) 995-4032 Fax http://www.annualsurveyofamericanlaw.org 35568-nys_69-2 Sheet No. 2 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 3 23-OCT-14 9:10 For what avail the plough or sail Or land or life, if freedom fail? EMERSON 35568-nys_69-2 Sheet No. 2 Side A 10/28/2014 12:36:12 35568-nys_69-2 Sheet No. 2 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 4 23-OCT-14 9:10 35568-nys_69-2 Sheet No. 2 Side B 10/28/2014 12:36:12 iv 35568-nys_69-2 Sheet No. 3 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 5 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW 2013-2014 BOARD OF EDITORS Editor-in-Chief YAEL TZIPORI Managing Editors GABRIEL BRUNSWICK JULIA C. PILCER Development Editors Executive Article Editors Senior Articles Editor JULIAN GINOS MARY BRUST LEAH S. MARTIN ALEX J. GORMAN ILYSSA L. COGHLAN MATTHEW W. DEAVERS Note Editors ARYEH L. ROSKIES HAROLD S. LAIDLAW AMANDEEP SINGH Symposium Editor PETER VAN VALKENBURGH GREGORY SPRINGSTED DAVID A. GIROUX PATRICK R. TOTARO Article Editors SIOBHAN C. ATKINS MICHAEL F. GOON JANE PARK PAUL S. BALIK JORDANA LAUREN HAVIV JEFFREY RITHOLTZ MICHAEL A. CANENCIA PETER HUR THEODORE D. SAMETS JOSEPH M. CASTELLI GAIL L. HYMAN ALEXANDRA SAMOWITZ WALTER A. CIACCI NICOLE IDOKO NICHOLAS C. SCHOLTEN JOSHUA S. COHN CHRISTINE A. KUVEKE MELISSA B. SIEGEL GRAHAM COLE CHARLES M. LUPICA CHRISTOPHER BRODERICK SMITH DANIELLE ELIZABETH DEBOLD CHIP MCCORKLE NAOMI R. SOSNER JOSHUA M. DRAPEKIN ALLEN MINTZ MAX TIERMAN NICOLE A. ESCOBAR BEN NOTTERMAN DANIEL WOLFF 35568-nys_69-2 Sheet No. 3 Side A 10/28/2014 12:36:12 MEAGAN L. FROEMMING GIL OFIR KYUNGEUN KIMBERLY WON Staff Editors K. DANIEL BERMAN COLIN HUSTON-LITER ALLISON C. NICHOLS ELIZABETH BUECHNER FRANCIS JOYNER EMILY NIX CATHERINE Y. CHEN HEATHER KANTER NEAL PERLMAN PATRICK K. CHILELLI JORDAN KASS ROSE C. PLAGER-UNGER JORDAN CHISOLM DOUGLAS KEITH RAFAEL REYNERI DAVID A. CIOS SEAN KIM OLIVER J. RICHARDS BOAZ COHEN DARYL L. KLEIMAN MICHAEL R. ROBERTS HARRY FIDLER CHRISTOPHER K. LEUCHTEN MICHAEL ROMAIS CALEB J. FOUNTAIN ROBERT N. LICALZI JENNIFER SAECKL WILLIAM E. FREELAND CHRISTINA T. LIU SARAH E. SCHUSTER HALEY E. GARRETT JOSHUA LOBERT DANIEL SCHWARTZ RYAN H. GERBER MICHAEL LU JUNINE SO MEGAN GRAHAM JULIENNE MARKEL SHARON STEINERMAN REBECCA GUITERMAN BENJAMIN P.D. MEJIA REYHAN A. WATSON JONNAH HOLLANDER SUSAN E. MILLER SARAH WEISSMAN MAUREEN HOWLEY KATHERINE V. MITCHELL ELIZABETH WILKERSON CHRISTOPHER W. HUGHES JOSEPHINE YOON 35568-nys_69-2 Sheet No. 3 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 6 23-OCT-14 9:10 35568-nys_69-2 Sheet No. 3 Side B 10/28/2014 12:36:12 vi 35568-nys_69-2 Sheet No. 4 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 7 23-OCT-14 9:10 SUMMARY OF CONTENTS ARTICLES TOWARD ADEQUACY Sarah L. Brinton 357 SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo 417 A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page 441 NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin 503 WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND 35568-nys_69-2 Sheet No. 4 Side A 10/28/2014 12:36:12 THEORETICAL APPROACHES Joseph M. Eno 587 35568-nys_69-2 Sheet No. 4 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 8 23-OCT-14 9:10 35568-nys_69-2 Sheet No. 4 Side B 10/28/2014 12:36:12 viii 35568-nys_69-2 Sheet No. 5 Side A 10/28/2014 12:36:12 \\jciprod01\productn\N\NYS\69-2\NYS201.txt unknown Seq: 1 28-OCT-14 9:10 TOWARD ADEQUACY SARAH L. BRINTON* ABSTRACT Each year, hundreds of people, companies, organizations, and associations sue the federal government for injuries they have suf- fered at the hands of federal agencies. Such suits are often brought under the judicial review provisions of the Administrative Proce- dure Act (APA), which Congress enacted expressly to allow broad access to courts in an age of increasing administrative agency ac- tion. By the terms of the APA itself, all final agency action for which there is no other adequate remedy in a court is reviewable under the APA. But the very language meant to welcome such suits into court also acts as a bar: to be eligible for judicial review under the APA, agency actions must have “no other adequate remedy in a court” (NOARC). Despite the facial ambiguity of the NOARC require- ment—“adequacy is in the eye of the beholder,” as one scholar re- cently wrote—NOARC is a provision that has long been ignored by academia, treatise writers, and the Supreme Court. The Justices have only explicitly addressed the meaning of NOARC in one case, Bowen v. Massachusetts, 487 U.S. 879 (1988), with a patchwork opin- ion marked by its meandering analysis and muddled reasoning. With only Bowen as a guide, confusion has abounded—in the Court’s own jurisprudence, in the lower courts, and in the active 35568-nys_69-2 Sheet No. 5 Side A 10/28/2014 12:36:12 advocacy of practitioners. Recent cases demonstrate that the question of NOARC is not an esoteric one. Rather, the rights of children in need of state-pro- vided mental health care services, of women and Hispanic farmers to retain long-held family lands, and of U.S. citizens with Mexican American surnames applying for U.S. passports have all depended on the meaning of the NOARC requirement. And yet, no consensus about NOARC exists. In light of the NOARC requirement’s wide impact and high stakes, our anemic NOARC jurisprudence must be replaced with robust dialogue about the meaning of NOARC and * Research Fellow, J. Reuben Clark Law School, Brigham Young University. She thanks Jed Brinton, Jay Bybee, Evan Criddle, Steven Menashi, Diane Roldan,´ Gul Raza, Rebecca Rygg Jensen, and the faculty of the J. Reuben Clark Law School for their contributions and assistance. The author welcomes comments: [email protected]. 357 35568-nys_69-2 Sheet No. 5 Side B 10/28/2014 12:36:12 \\jciprod01\productn\N\NYS\69-2\NYS201.txt unknown Seq: 2 28-OCT-14 9:10 358 NYU ANNUAL SURVEY OF AMERICAN LAW [Vol.
Recommended publications
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Multi-Core Architecture for Anonymous Internet Streaming
    Multi-core architecture for anonymous Internet streaming Quinten Stokkink Multi-core architecture for anonymous Internet streaming Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Quinten Stokkink 3rd March 2017 Author Quinten Stokkink Title Multi-core architecture for anonymous Internet streaming MSc presentation 15th March 2017 Graduation Committee Graduation professor: Prof. dr. ir. D. H. J. Epema Delft University of Technology Supervisor: Dr. ir. J. A. Pouwelse Delft University of Technology Committee member: Dr. Z. Erkin Delft University of Technology Abstract There are two key components for high throughput distributed anonymizing ap- plications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for an- onymization. Using a state of the art serialization technology has been shown to increase performance, in terms of CPU utilization, by 65%. This is due to the com- pression (byte stuffing) used by this technology. It also decreased lines of code in the Tribler project by roughly 2000 lines. Single-core architectures are shown to be optimizable by performing a minimum s,t-cut on the data flows within the original architecture: between the entry point and the most costly CPU-utilizing compon- ent as derived from profiling the application. This method is used on the Tribler technology to create a multi-core architecture. The resulting architecture is shown to be significantly more efficient in terms of consumed CPU for the delivered file download speed.
    [Show full text]
  • Credits in Bittorrent: Designing Prospecting and Investments Functions
    Credits in BitTorrent: designing prospecting and investments functions Ardhi Putra Pratama Hartono Credits in BitTorrent: designing prospecting and investment functions Master’s Thesis in Computer Science Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Ardhi Putra Pratama Hartono March 17, 2017 Author Ardhi Putra Pratama Hartono Title Credits in BitTorrent: designing prospecting and investment functions MSc presentation Snijderzaal, LB01.010 EEMCS, Delft 16:00 - 17:30, March 24, 2017 Graduation Committee Prof. Dr. Ir. J.A. Pouwelse (supervisor) Delft University of Technology Prof. Dr. Ir. S. Hamdioui Delft University of Technology Dr. Ir. C. Hauff Delft University of Technology Abstract One of the cause of slow download speed in the BitTorrent community is the existence of freeriders. The credit system, as one of the most widely implemented incentive mechanisms, is designed to tackle this issue. However, in some cases, gaining credit efficiently is difficult. Moreover, the supply and demand misalign- ment in swarms can result in performance deficiency. As an answer to this issue, we introduce a credit mining system, an autonomous system to download pieces from selected swarms in order to gain a high upload ratio. Our main work is to develop a credit mining system. Specifically, we focused on an algorithm to invest the credit in swarms. This is composed of two stages: prospecting and mining. In prospecting, swarm information is extensively col- lected and then filtered. In mining, swarms are sorted by their potential and then selected. We also propose a scoring policy as a method to quantify swarms with a numerical score.
    [Show full text]
  • Master's Thesis
    MASTER'S THESIS Analysis of UDP-based Reliable Transport using Network Emulation Andreas Vernersson 2015 Master of Science in Engineering Technology Computer Science and Engineering Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract The TCP protocol is the foundation of the Internet of yesterday and today. In most cases it simply works and is both robust and versatile. However, in recent years there has been a renewed interest in building new reliable transport protocols based on UDP to handle certain problems and situations better, such as head-of-line blocking and IP address changes. The first part of the thesis starts with a study of a few existing reliable UDP-based transport protocols, SCTP which can also be used natively on IP, QUIC and uTP, to see what they can offer and how they work, in terms of features and underlying mechanisms. The second part consists of performance and congestion tests of QUIC and uTP imple- mentations. The emulation framework Mininet was used to perform these tests using controllable network properties. While easy to get started with, a number of issues were found in Mininet that had to be resolved to improve the accuracy of emulation. The tests of QUIC have shown performance improvements since a similar test in 2013 by Connectify, while new tests have identified specific areas that might require further analysis such as QUIC’s fairness to TCP and performance impact of delay jitter. The tests of two different uTP implementations have shown that they are very similar, but also a few differences such as slow-start growth and back-off handling.
    [Show full text]
  • Economics of P2P File- Sharing Systems
    Economics of P2P file- sharing systems Basic introduction to the (sociology and) economics of file-sharing in BitTorrent systems name: David Hales, Tribler team, TUD date: Oct. 21, 2008 event: PetaMedia workshop Talk Overview • Basic introduction to: • P2P systems • Overlay networks • Gossip • Tribler.org client • Basic introduction to: • BitTorrent file sharing protocol • Game theory / strategy / Tit-for-tat • Future directions in Tribler If you are interested you can look-up the terms given in red italics on Wikipedia for good introductions What are Peer-to-Peer systems? • All nodes both clients and servers • Multiple connections between nodes • Notion of “equality” Client / Server hence “peers” • Pure P2P = Zero server • It is about power not just as technology Peer-to-Peer What is an “overlay network” • Most P2P networks are logical not physical • Use an overlay network • Assume an existing physical network that can connect all peers (usually the internet) • Store the logical addresses (IP’s) of their “neighbours” or “view” onto the network • Overlays are often self-repairing, robust to “churn” and light-weight • Given their logical nature overlays can support arbitrary and dynamic topologies • Structured and Unstructured overlays Tribler Overlay and MegaCache • Tribler is a (BitTorrent) file sharing client • Implements gossip based semi-random overlay network (using BuddyCast protocol) • Gossip protocols pair random nodes in the overlay and let them exchange information • Tribler clients swap information (meta-data) and store it
    [Show full text]
  • 1 Tribler 3 1.1 Obtaining the Latest Release
    Tribler Documentation Release 7.5.0 Tribler devs Jan 29, 2021 CONTENTS 1 Tribler 3 1.1 Obtaining the latest release........................................3 1.2 Obtaining support............................................3 1.3 Contributing...............................................3 1.4 Packaging Tribler.............................................4 1.5 Submodule notes.............................................4 2 How to contribute to the Tribler project?5 2.1 Checking out the Stabilization Branch..................................5 2.2 Reporting bugs..............................................5 2.3 Pull requests...............................................6 3 Branching model and development methodology7 3.1 Branching model.............................................7 3.2 Release lifecycle.............................................7 3.3 Tags....................................................8 3.4 Setting up the local repo.........................................8 3.5 Working on new features or fixes....................................8 3.6 Getting your changes merged upstream.................................9 3.7 Misc guidelines.............................................. 10 4 Setting up your development environment 11 4.1 Windows................................................. 11 4.2 MacOS.................................................. 13 4.3 Linux................................................... 15 5 Building Tribler 17 5.1 Windows................................................. 17 5.2 MacOS.................................................
    [Show full text]
  • Researchers Make Bittorrent Anonymous and Impossible to Shut Down (Updated) by Ernesto on December 18, 2014 C: 350
    RESEARCHERS MAKE BITTORRENT ANONYMOUS AND IMPOSSIBLE TO SHUT DOWN (UPDATED) BY ERNESTO ON DECEMBER 18, 2014 C: 350 While the BitTorrent ecosystem is filled with uncertainty and doubt, researchers at Delft University of Technology have released the first version of their anonymous and decentralized BitTorrent network. "Tribler makes BitTorrent anonymous and impossible to shut down," lead researcher Prof. Pouwelse says. The Pirate Bay shutdown has once again shows how vulnerable the BitTorrent ‘landscape’ is to disruptions. With a single raid the largest torrent site on the Internet was pulled offline, dragging down several other popular BitTorrent services with it. A team of researchers at Delft University of Technology has found a way to address this problem. With Tribler they’ve developed a robust BitTorrent client that doesn’t rely on central servers. Instead, it’s designed to keep BitTorrent alive, even when all torrent search engines, indexes and trackers are pulled offline. “Tribler makes BitTorrent anonymous and impossible to shut down,” Tribler’s lead researcher Dr. Pouwelse tells TF. “Recent events show that governments do not hesitate to block Twitter, raid websites, confiscate servers and steal domain names. The Tribler team has been working for 10 years to prepare for the age of server-less solutions and aggressive suppressors.” To top that, the most recent version of Tribler that was released today also offers ‘anonymity’ to its users through a custom-built in Tor network. This allows users to share and publish files without broadcasting their IP-addresses to the rest of the world (note: see warning at the bottom of this article).
    [Show full text]
  • Petter Sandvik Formal Modelling for Digital Media Distribution
    Petter Sandvik Formal Modelling for Digital Media Distribution Turku Centre for Computer Science TUCS Dissertations No 206, November 2015 Formal Modelling for Digital Media Distribution Petter Sandvik To be presented, with the permission of the Faculty of Science and Engineering at Åbo Akademi University, for public criticism in Auditorium Gamma on November 13, 2015, at 12 noon. Åbo Akademi University Faculty of Science and Engineering Joukahainengatan 3-5 A, 20520 Åbo, Finland 2015 Supervisors Associate Professor Luigia Petre Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Professor Kaisa Sere Faculty of Science and Engineering Åbo Akademi University Joukahainengatan 3-5 A, 20520 Åbo Finland Reviewers Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom Professor Gheorghe S, tefănescu Computer Science Department University of Bucharest 14 Academiei Str., Bucharest, RO-010014 Romania Opponent Professor Michael Butler Electronics and Computer Science Faculty of Physical Sciences and Engineering University of Southampton Highfield, Southampton SO17 1BJ United Kingdom ISBN 978-952-12-3294-7 ISSN 1239-1883 To tose who are no longr wit us, and to tose who wil be here afer we are gone i ii Abstract Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer.
    [Show full text]
  • March/April 2012 the Administrator’S Advantage 1 IS RECORDS MANAGEMENT ALWAYS the LAST PRIORITY? Ll Rights Reserved
    INSIDE: The Trends MINISTRATOR’S Jessa Baker: Tip-Offs & Buzzer Beaters: What’s Happening On & Off the Court 14 V ANTAGE Data Security Bob Gaines: Data Security Matters 18 MARCH / APRIL 2012 Marketing Patrick Johansen: Four Trends To Improve Your Marketing Budget 28 Printing Solutions Cheryl Ferguson: Managed Print Solutions: Best Practices: Developing A Comprehensive Strategy to Improve Efciency and Lower Costs 34 Workplace Andrea Brandt: What Today’s Law Firm Leaders Need to Know 36 Legal Industry Issue March/April 2012 The Administrator’s Advantage 1 IS RECORDS MANAGEMENT ALWAYS THE LAST PRIORITY? ll rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated. .A © 2010 Iron Mountain Incorporated ELEVATE THE IMPORTANCE OF LEGAL RECORDS MANAGEMENT You’ve always known that how well your firm manages its records, performs discoveries and produces evidence directly impacts client service, risk mitigation www.ironmountain.com and operating costs. Now, you can prove it with Iron Mountain’s cost-effective 800-899-IRON eRecords Management and Digital Archive services. Secure storage keeps your valuable records protected and compliant, while fast, easy, web-based document For local service call search and retrieval capabilities deliver the information you need, when it’s 630-936-8174. needed. For over 50 years Iron Mountain has been helping law firms reap the rewards of effective records management. Shouldn’t your firm be one of them? RECORDS MANAGEMENT | DATA PROTECTION AND RECOVERY|SECURE SHREDDING 2 The Administrator’s Advantage March/April 2012 IS RECORDS MANAGEMENT ALWAYS The THE LAST PRIORITY? MINISTRATOR’S V ANTAGE Legal Industry Trends Articles The Administrator’s Advantage Tip-Offs & Buzzer Beaters: March/April 2012 What’s Happening On & Off the Court .
    [Show full text]
  • The Jury Trial
    Page 1 6 of 29 DOCUMENTS Copyright (c) 2005 Chicago Bar Association CBA RECORD February/March, 2005 19 CBA Record 34 ARTICLE: THE JURY TRIAL TEXT: [*34] Blackstone's Commentaries on the Laws of England, Book the Third, Chapter the Twenty-Third: Of the Trial by Jury 379-80 (Oxford: Clarendon Press, 1st Ed. 1765-1769). As is customary, the February-March issue of the CBA Record has been largely entrusted to the YLS Journal. This year, we offer five articles unified by the theme of the jury trial. The editors of the YLS Journal chose this theme early in the summer of 2004, while brainstorming over Indian cuisine, red wine, and topics of conversation that ranged from the USA PATRIOT Act to the Second Amendment. Somehow, the importance of liberty unified the contentious spectrum of political persuasions at the table: and each of us saw the jury trial not only as a microcosm of the checks and balances that play out on C-SPAN, but also as a fundamental mechanism of liberty and justice in America. We also recognized the value of a theme that so obviously lends itself to articles of both a practical and a theoretical nature. Later, we learned that a similar theme was adopted by the Young Lawyers Division of the ABA. Maybe there was something in that post-9/11 summer air. One can only hope that pondering liberty and justice is contagious. Nicholas C. Dranias, Kristyna C. Ryan YLS Journal Co-Editors in Chief Elliot Richardson, Assistant Editor Legal Topics: For related research and practice materials, see the following legal topics: GovernmentsFederal GovernmentDomestic Security GRAPHIC: PICTURE, no caption Page 2 7 of 29 DOCUMENTS Copyright (c) 2005 Chicago Bar Association CBA RECORD February/March, 2005 19 CBA Record 38 IN THIS ISSUE: RECONSIDERING F.H.
    [Show full text]
  • A Virtualized Infrastructure for Automated Bittorrent Performance Testing and Evaluation
    A Virtualized Infrastructure for Automated BitTorrent Performance Testing and Evaluation R˘azvan Deaconescu George Milescu Bogdan Aurelian R˘azvan Rughini¸s Nicolae T¸˘apu¸s University Politehnica of Bucharest Computer Science Department Splaiul Independent¸ei nr. 313, Bucharest, Romania frazvan.deaconescu, george.milescu, bogdan.aurelian, razvan.rughinis, [email protected] Abstract 1 Introduction In the last decade, file sharing systems have gener- P2P sharing systems are continuously developing ally been dominated by P2P solutions. Whereas email and increasing in size. There is a large diversity of so- and HTTP have been the \killer apps" of the earlier In- lutions and protocols for sharing data and knowledge ternet, a large percentage of the current Internet back- which enable an increasing interest from common users bone traffic is BitTorrent traffic [15]. BitTorrent has and commercial and academic institutions [22]. proven to be the perfect file sharing solution for a de- It is assumed [15] that BitTorrent is responsible for centralized Internet, moving the burden from central a large portion of all Internet traffic. BitTorrent has servers to each individual station and maximizing net- proven to be the \killer" application of the recent ears, work performance by enabling unused communication by dominating the P2P traffic in the Internet [24]. paths between clients. During the recent years BitTorrent [16] has become the de facto P2P protocol used throughout the Inter- Although there have been extensive studies regarding net. A large portion of the Internet backbone is cur- the performance of the BitTorrent protocol and the im- rently comprised of BitTorrent traffic [18].
    [Show full text]