Obtained by POLITICO

Total Page:16

File Type:pdf, Size:1020Kb

Obtained by POLITICO UNITED STATES OF AMERICA FEDERAL TRADE COMMISSION WASHINGTON, D.C. 20580 Bureau of Competition Project Code: DXI MEMORANDUM TO: Commission FROM: Barbara R. Blank, Gustav P. Chiarello, Melissa Westman-Cherry, Matthew Accornero, Jennifer Nagle, Anticompetitive Practices Division; James Rhilinger, Healthcare Division; James Frost, Office of Policy and Coordination; Priya B. Viswanath, Office of the Director; Stuart Hirschfeld, Danica Noble, Northwest Region; Thomas Dahdouh, Western Region-San Francisco, Attorneys; Daniel Gross, Robert Hilliard, Catherine McNally, Cristobal Ramon, Sarah Sajewski, Brian Stone, Honors Paralegals; Stephanie Langley, Investigator DATE: August 8, 2012 POLITICO SUBJECT: Google Inc. File No. 111-0163 1 by RECOMMENDATION: That the Commission Issue the Attached Complaint 1 Google is represented by Susan Creighton, Jonathan Jacobson, Lydia Parnes, Scott Sher, and Seth Silber of Wilson Sonsini Goodrich & Rosati in Washington, D.C., and by John Schmidtlein and David Kendall of Williams & Connolly LLP in Washington, D.C. Microsoft is represented by Charles ("Rick") Rule and Jonathan Kanter ofCadwalader Wickersham & Taft LLP in Washington, D.C., and Deborah Garza of Covington & Burling LLP in Washington, D.C. Yahoo! is represented by Hanno Kaiser of Latham & Watkins LLP in San Francisco, California. Facebook, Expedia, and TripAdvisor are represented by Thomas 0. Barnett of Covington & Burling LLP in Washington, D.C. Amazon.com is represented by Scott Gant of Boies, Schiller & Flexner LLP in Washington, D.C. eBay is represented by William H. Rooney ofWillkie, Farr & Gallagher LLP in New York, New York. NexTag, Foundem, and TheFind are represented by Gary L. Reback of Carr & FerrellObtained LLP in Menlo Park, California. Motorola Mobility is represented by Damian Didden ofWachtell Lipton Rosen & Katz in New York, New York, and Scott Sher of Wilson Sonsini Goodrich & Rosati in Washington, D.C. Apple is represented by Amanda Reeves and Hanno Kaiser of Latham & Watkins LLP in San Francisco, California. LG Display is represented by Beau Buffier and Vittorio Cottafavi of Sheannan & Sterling LLP in New York, New York. Verizon Communications is represented by Thomas O. Barnett of Covington & Burling LLP in Washington, D.C. Samsung Telecommunications America is represented by Gregory Huffman of Thompson & Knight LLP in Dallas, Texas. Research In Motion ("RIM") is represented by Logan Breed of Hogan Lovells in Washington, D.C. Sony Corporation of America is represented by M. Sean Royall of Gibson Dunn & Crutcher LLP in Washington, D.C. T-Mobile U.S.A. is represented by Douglas C. Ross of Davis Wright Tremaine in Seattle, Washington. [ EXECUTIVE SUMMARY Google Inc. ("Google") is the world's dominant Internet search engine and seller of [ search advertising. Staff has investigated several allegations of anticompetitive conduct by Google. Four of the five main areas are addressed by this memorandum, while Google's r· I mobile conduct will be addressed in a supplemental memorandum. L. Staffs recommendations are premised on our conclusion that Google has monopoly power in three relevant antitrust markets in the United States: Horizontal Search; Search r· I Advertising; and Syndicated S·earch and Search Advertising. L First, Staff has investigated whether Google has unlawfully preferenced its own content over that of rivals, while simultaneously demoting rival websites. Complainants F. have alleged that this conduct has impaired their ability to compete effectively in the markets for general search and search advertising. AlthoughPOLITICO it is a close call, we do not recommend that the Commission proceed on this cause of action because the case law is not favorable to our theory, which is premised on anticompetitiveby product design, and in any event, Google's efficiency justifications are strong. Most importantly, Google can legitimately claim that at least part of the conduct at issue improves its product and benefits users. Second, Staff has investigated whether Google has unlawfully ~'scraped/' or appropriated, the content of vertical rivals in order to improve its own vertical products. We conclude that Google's conduct should be condemned as a conditional refusal to deal under Section 2 because (i) Google's prior voluntary course of dealing with vertical rivals offers Obtained L clear evidence that the relationship was mutually beneficial, (ii) Google's threats to remove rival content from its general web search results was designed solely to coerce rivals into allowing Google to user their content for Google's competing vertical product, and (iii) the rt 11 rI natural and probable effect of Google's conduct is to diminish the incentives of vertical websites to invest in, and _to develop, new and innovative content. In the alternative, Google's conduct may be condemned as a stand-alone violation of Section 5. Google has presented no efficiency justification for its conduct. Third, Staff has investigated whether Google has employed anticompetitive contractual restrictions on the automated cross-management ofadvertising-campaigns. Google's main rival (Microsoft) has alleged that Google is denying Microsoft critical scale by employing these restrictions, and thus impairing Microsoft's ability to compete effectively in the markets for general search and search advertising. We conclude that these restrictions should be condemned under Section 2 because they limit the ability of advertisers to make use of their own data, and as such, have i~duced innovation and increased transaction costs among advertisers and third-party businesses, and alsoPOLITICO degraded the quality of Google's rivals in search and search advertising. Google's proffered efficiency justification for these restrictions appears to be pretextual. by Fourth,. Staff has investigated whether Google has entered into anticompetitive, exclusionary agreements with websites for syndicated search and search advertising services. We conclude that Google's agreements should be condemned under Section 2 because they foreclose some portion of the market, and, although the agreements result in only modest anticompetitive effects on publishers, the impact of the agreements in denying scale to competitorsObtained is both competitively significant to its main rival (Microsoft) today, as well as a significant barrier to entry for potential entrants in the longer term. While Google presents efficiency justifications for these agreements, on balance, Staff finds them to be non­ persuasive. iii Staff has identified several possible remedies to Google's conduct. Specifically, for Google's scraping conduct, Google could be required to provide an "opt-out" feature to [ remove "snippets" of website content (i.e., user reviews, ratings) from. Google's vertical r L properties, while retaining the snippets in Google's web search results and/or its Universal r i Search results on the main search results page. Google could also be required to more L generally limit the use of the content it indexes for its web search results. For Google's campaign management restrictions, Google could be required to remove the problematic contractual restrictions from. its license agreements. For Google's exclusionary syndication L agreements, Google could be enjoined from. entering into exclusive agreements with search syndication partners, and required to substantially loosen restrictions surrounding syndication partners' use of rival search advertisements. There are a number of substantial risks associatedPOLITICO with bringing a case against L. Google. Most notably, GooglewiH be able to argue that Microsoft's most efficient r distribution channel is Bing.com.; and thatby any scale Microsoft might gain through the l elimination of the challenged restrictions and agreements will be immaterial to improving L Bing's competitive position. Nevertheless, Staff concludes that Google's conduct has resulted - and will result - in real harm. to consumers and to innovation in the online search and advertising markets. r i L Therefore, Staff recommends that the Com.mission issue the attached com.plaint. r Obtained L r L i L r !L IV [ TABLE OF CONTENTS I. HISTORY OF THE INVESTIGATION AND RELATED PROCEEDINGS ... -1- A. FTC Investigation ...................................................................-1- B. European Commission Investigation ............................................-2- C. Multi-State Investigation .................... ~ ..................................... -3- D. Private Litigation .................................. ~ ..................................-3- 11. STATEMENT OF FACTS .................................................................-4- A. The Parties ........................................................................... -4- 1. Google· ...................................•.....................................-4- 2. General Search Competitors .............................................-5- a. Microsoft ............................................................-5- b. Yahoo! ....... , .......................................................POLITICO -5- 3. Major Vertical Complainants ...........................................-6- a. Amazon ..........•.......by ~ ..........................................-6- b. eBay ..................................................................-6- c. N exTag ..............................................................-6- d. Foundem ............................................................-6- e. Expedia .............................................................-
Recommended publications
  • Retail for Lease 2987 Granville Street Vancouver, British Columbia
    RETAIL FOR LEASE 2987 GRANVILLE STREET VANCOUVER, BRITISH COLUMBIA Exceptional Yaletown Retail Opportunity CONTACT US Mario Negris Nolan Toigo Personal Real Estate Corporation Sales Representative Executive Vice President +1 778 372 3938 +1 604 662 3000 [email protected] [email protected] URBAN | PROPERTIES | GROUP WEST 5TH AVENUE UNO LANGANN INE ART AVAILABLE TAL SHOP CHEESECAE ETC. IRA HAA SPA ATINSONS WEST 6TH AVENUE UNER CONSTRUCTION ASTERPIECE PAULS PLACE OLETTERY ART|ANTIUES|ESIGN URBAN ITNESS ARARAT RUGS SCOTT ART RAIN SONS ART AVYAN CARPETS CANAIAN CANNABIS CANCER RESERACH ASTERS GALLERY HEEL INE ART STARBUCS AUCTION GALLERY WEST 7TH AVENUE VACANT INUSTRIAL REVOLUTION ONA NELLIS IAN TAN GALLERY AVAILABLE CACHE COUTURE VANCOUVER HAIR ACAEY URBAN BARN OUGLAS REYNOLS GALLERY SUYA HOE ECOR ALISON BOUTIUE THE BRIC GRANVILLE STREET AVAILABLE WEST 8TH AVENUE STRUCTUBE PA PAYRY RUG VILLA BEAU INTERIORS VERANAH ANTIUES CALIORNIA CLOSETS URBANITY SG P GALLERY ALLURE NAILS SPA UBREAITII RESH SLICE LE SALON HAE SOE SHOP URBATO GALLERY RE RUBY HAIR STUIO RBC AVAILABLE WEST BROADWAY BLEN COEE CONALS RESTAURANT CHOW SANG INIGO 2 LEVELS EWELLERY E3 URNITURE BURRITO CURRENCY STARBUCS ECHANGE SUSHI VAN GRANVILLE GREEN RHINO EICAL CLINIC IREHALL CANNABIS VANCOUVER SHOE REPAIR PHARASAVE RESTORATION HARWARE PUBLIC LIBRARY EWAR CHAPAN WOAN W 10TH AVENUE BAN O ONTREAL POTTERY BARN AVAILABLE 2 LEVELS ASON . REE PEOPLE AS BEER WINE SPIRITS SOT OC THE ARUIS HOUSE O NIVES ASHIA OE ASHION ROOTS ECCO STARBUCS COEE EYES OR YOU LUSSO BABY WIRELESS
    [Show full text]
  • To E-Commerce EC4E Ch 01 WA 11-23.Qxd 12/10/2007 5:16 PM Page 2
    EC4E_Ch_01_WA_11-23.qxd 12/10/2007 5:16 PM Page 1 PART 1 CHAPTER 1 The Revolution Is Just Beginning CHAPTER 2 E-commerce Business Models and Concepts Introduction to E-commerce EC4E_Ch_01_WA_11-23.qxd 12/10/2007 5:16 PM Page 2 CHAPTER11 The Revolution Is Just Beginning LEARNING OBJECTIVES After reading this chapter, you will be able to: ■ Define e-commerce and describe how it differs from e-business. ■ Identify and describe the unique features of e-commerce technology and discuss their business significance. ■ Recognize and describe Web 2.0 applications. ■ Describe the major types of e-commerce. ■ Discuss the origins and growth of e-commerce. ■ Understand the evolution of e-commerce from its early years to today. ■ Identify the factors that will define the future of e-commerce. ■ Describe the major themes underlying the study of e-commerce. ■ Identify the major academic disciplines contributing to e-commerce. EC4E_Ch_01_WA_11-23.qxd 12/10/2007 5:16 PM Page 3 MySpace and Facebook: It’s All About You ow many people watched the final episode of the most popular American Htelevision show in history, the Sopranos? Answer: about 12 million (out of a total television audience size of 111 million). Only once in American history has a television show drawn more simultaneous viewers—13 million for NBC’s “America’s Got Talent” premiere in 2006. How many people visit MySpace each month? About 70 million. There are now more than 100 million personal profiles on MySpace. Almost 40 million visit MySpace’s closest social network rival, Facebook, each month.
    [Show full text]
  • Notes and Sources for Evil Geniuses: the Unmaking of America: a Recent History
    Notes and Sources for Evil Geniuses: The Unmaking of America: A Recent History Introduction xiv “If infectious greed is the virus” Kurt Andersen, “City of Schemes,” The New York Times, Oct. 6, 2002. xvi “run of pedal-to-the-medal hypercapitalism” Kurt Andersen, “American Roulette,” New York, December 22, 2006. xx “People of the same trade” Adam Smith, The Wealth of Nations, ed. Andrew Skinner, 1776 (London: Penguin, 1999) Book I, Chapter X. Chapter 1 4 “The discovery of America offered” Alexis de Tocqueville, Democracy In America, trans. Arthur Goldhammer (New York: Library of America, 2012), Book One, Introductory Chapter. 4 “A new science of politics” Tocqueville, Democracy In America, Book One, Introductory Chapter. 4 “The inhabitants of the United States” Tocqueville, Democracy In America, Book One, Chapter XVIII. 5 “there was virtually no economic growth” Robert J Gordon. “Is US economic growth over? Faltering innovation confronts the six headwinds.” Policy Insight No. 63. Centre for Economic Policy Research, September, 2012. --Thomas Piketty, “World Growth from the Antiquity (growth rate per period),” Quandl. 6 each citizen’s share of the economy Richard H. Steckel, “A History of the Standard of Living in the United States,” in EH.net (Economic History Association, 2020). --Andrew McAfee and Erik Brynjolfsson, The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies (New York: W.W. Norton, 2016), p. 98. 6 “Constant revolutionizing of production” Friedrich Engels and Karl Marx, Manifesto of the Communist Party (Moscow: Progress Publishers, 1969), Chapter I. 7 from the early 1840s to 1860 Tomas Nonnenmacher, “History of the U.S.
    [Show full text]
  • Up Acquisitions: Introducing the Economic Goodwill Threshold Test Andrew Mclean
    Series A Financial Capitalism Perspective on Start- up Acquisitions: Introducing the Economic Goodwill Threshold Test Andrew McLean Centre for Law, Economics and Society CLES Faculty of Laws, UCL Director: Dr. Deni Mantzari Founding Director: Professor Ioannis Lianos CLES Research Paper Series 2/2020 A Financial Capitalism Perspective on Start-up Acquisitions: Introducing the Economic Goodwill Threshold Test Andrew McLean July 2020 Centre for Law, Economics and Society (CLES) Faculty of Laws, UCL London, WC1H 0EG The CLES Research Paper Series can be found at https://www.ucl.ac.uk/cles/research-papers All rights reserved. No part of this paper may be reproduced in any form without permission of the author. ISBN 978-1-910801-31-4 © Centre for Law, Economics and Society Faculty of Laws, UCL London, WC1H 0EG United Kingdom A Financial Capitalism Perspective on Start-up Acquisitions: Introducing the Economic Goodwill Threshold Test Andrew McLean1 Abstract This paper discusses the acquisition of start-ups by major technology firms. Such transactions pose a significant anticompetitive threat, yet often escape competition scrutiny because they fail to trigger merger notification threshold tests. Alongside a financial analysis of historic acquisitions by Google, Apple, Facebook, Amazon and Microsoft, the paper introduces a new threshold test—the economic goodwill test. The economic goodwill test is a concerned with the value of a target’s net tangible assets as a proportion of total transaction value. The difference between these figures largely represents the gains an acquirer expects to realise from a strengthened competitive position, therefore reflecting the logic driving the mass acquisition of technology start-ups.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • From Legi(Macy to Informed Consent: Mapping Best Prac(Ces and Iden
    From legimacy to informed consent: mapping best pracces and idenfying risks A report from the Working Group on Consumer Consent May 2009 PEN paper 3 About the Working Group The Working Group on Consumer Consent is a project convened by the Information Systems & Innovation Group of the London School of Economics and Political Science and administered by 80/20 Thinking Ltd, based in London UK. The Working Group aims to bring together key industry players, consumer experts and regulators to achieve the following goals: • To better understand the implications of the Article 29 Working Party Opinion on data protection issues related to search engines (April 2008) and its potential impact on the processing of personal information in the non-search sectors. • To foster dialogue between key stakeholders to map current practices relating to notification and consent. • To inform regulators about limitations and opportunities in models and techniques for informed consent for the processing of personal information. • To help inform all stakeholders on aspects of the pending Article 29 Opinion on targeted advertising planned in 2009. Membership The members of the Working Group included: AOL, BT, Covington & Burling, eBay, Enterprise Privacy Group, Facebook, the Future of Privacy Forum, Garlik, Microsoft, Speechly Bircham, Vodafone, and Yahoo! We also sought comments from a number of privacy commissioners and regulators from across Europe. Methodology, Meetings, and Outreach We have been actively engaging with policy-makers and regulators since the creation of the group. This networking not only enhances the quality of the research, but also goes some way to identify and prepare the audience for our discussion papers.
    [Show full text]
  • View Annual Report
    TO OUR SHAREHOLDERS, CUSTOMERS, PARTNERS AND EMPLOYEES: This is a unique letter for me – the last shareholder letter I will write as the CEO of the company I love. We have always believed that technology will unleash human potential and that is why I have come to work every day with a heart full of passion for more than 30 years. Fiscal Year 2013 was a pivotal year for Microsoft in every sense of the word. Last year in my letter to you I declared a fundamental shift in our business to a devices and services company. This transformation impacts how we run the company, how we develop new experiences, and how we take products to market for both consumers and businesses. This past year we took the first big bold steps forward in our transformation and we did it while growing revenue to $77.8 billion (up 6 percent). In addition, we returned $12.3 billion (up 15 percent) to shareholders through dividends and stock repurchases. While we were able to grow revenue to a record level, our earnings results reflect investments as well as some of the challenges of undertaking a transformation of this magnitude. With this as backdrop, I’d like to summarize where we are now and where we’re headed, because it helps explain why I’m so enthusiastic about the opportunity ahead. Our strategy: High-value activities enabled by a family of devices and services We are still in the early days of our transformation, yet we made strong progress in the past year launching devices and services that people love and businesses need.
    [Show full text]
  • INSECURE-Mag-9.Pdf
    Another year is almost over and a plethora of information security problems are behind us. To let 2006 go out in style, we bring you a feature packed issue of (IN)SECURE. As the feature interview for this issue we had the pleasure of talking with Kurt Sauer, the CSO at Skype, one of the most well-known companies in the digital world. We’ll be back next year with many new ideas in the pipeline. Stay tuned for coverage from a few conferences including the RSA Conference in San Francisco and the Black Hat Briefings &Training in Amsterdam. If you’re attending, be sure to drop me an e-mail and we’ll grab a drink. We wish you a safe 2007! Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com New enterprise single sign-on authentication software DigitalPersona announced the latest version of its award-winning enterprise product, DigitalPersona Pro 4.0. The new and improved software delivers a complete, accurate and trusted fingerprint Enterprise Single Sign-On (ESSO) solution with more secure authentication, improved manageability and the broadest support available for the world’s leading biometrically-enabled notebooks including models from Lenovo, HP, Dell, and Toshiba.
    [Show full text]
  • A/B Testing Challenges in Large Scale Social Networks
    From Infrastructure to Culture: A/B Testing Challenges in Large Scale Social Networks Ya Xu, Nanyu Chen, Adrian Fernandez, Omar Sinno, Anmol Bhasin LinkedIn Corp, 2029 Stierlin Court, Mountain View, CA 94043 {yaxu, nchen, afernandez, osinno, abhasin}@linkedin.com ABSTRACT experiments. The theory of controlled experiment dates back to Sir Ronald A. A/B testing, also known as bucket testing, split testing, or Fisher’s experiments at the Rothamsted Agricultural Experimental controlled experiment, is a standard way to evaluate user Station in England in the 1920s [11]. Since then, many textbooks engagement or satisfaction from a new service, feature, or and papers from different fields have provided theoretical product. It is widely used among online websites, including social foundations [20, 21, 32, 33] for running controlled experiments. network sites such as Facebook, LinkedIn, and Twitter to make While the theory may be straightforward, the deployment and data-driven decisions. At LinkedIn, we have seen tremendous mining of experiments in practice and at scale can be complex and growth of controlled experiments over time, with now over 400 challenging [13, 14]. In particular, several past KDD papers have concurrent experiments running per day. General A/B testing discussed at length the experimentation systems used at Microsoft frameworks and methodologies, including challenges and pitfalls, Bing and Google [8, 9], including best practices and pitfalls [7, have been discussed extensively in several previous KDD work 10]. Facebook also introduces the PlanOut language which [7, 8, 9, 10]. In this paper, we describe in depth the provides a toolkit for parameter-based experiments [12].
    [Show full text]
  • Does Hardware Configuration and Processor Load Impact Software Fault Observability?
    Does Hardware Configuration and Processor Load Impact Software Fault Observability? Raza Abbas Syed1, Brian Robinson2, Laurie Williams1 1Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 {rsyed, lawilli3}@ncsu.edu 2ABB Inc., US Corporate Research, Raleigh, NC 27606 [email protected] Abstract. Intermittent failures and nondeterministic behavior test teams during the product development cycle. For failures complicate and compromise the effectiveness of software detected in test, it is difficult to determine the underlying testing and debugging. To increase the observability of fault when reproducing the failure is not possible. When the software faults, we explore the effect hardware configurations underlying fault cannot be determined, the failure report is and processor load have on intermittent failures and the often closed and no additional effort is spent on it until nondeterministic behavior of software systems. We conducted additional occurrences are detected. For faults detected in the a case study on Mozilla Firefox with a selected set of reported field, developers spent considerable effort in either remotely field failures. We replicated the conditions that caused the debugging the fault or traveling to the customer site itself to reported failures ten times on each of nine hardware determine the fault and fix it. configurations by varying processor speed, memory, hard Nondeterministic behavior in software systems can be drive capacity, and processor load. Using several observability tools, we found that hardware configurations that had less attributed to a number of sources. Testers may not have processor speed and memory observed more failures than enough visibility or control over all of the inputs to the others.
    [Show full text]
  • Deployment Guide for Cisco Directory Connector
    Deployment Guide for Cisco Directory Connector First Published: 2017-02-24 Last Modified: 2020-02-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2020 Cisco Systems, Inc. All rights reserved. New and Changed Information Date Changes Made July 14, 2020 • Updated information on what to do when trying to claim users in Conflicting User Email Accounts, on page 71. June 18, 2020 • Updated a step in Choose Active Directory Objects to Synchronize to include how to customize attributes for room data (release 3.6). • Updated Directory Connector download link in Install Cisco Directory Connector, on page 17 June 2, 2020 • Added userAccountControl and ds-pwp-account-disabled attributes to the table in Active Directory and Cloud Attributes, on page 28. April 21, 2020 • Added a note in Do a Full Synchronization of Active Directory Users Into the Cloud to clarify that the auto-assign license template only applies to new users, not updated users. February 5, 2020 In the "Do a Full Synchronization of Active Directory Users Into the Cloud" topic, clarified some inaccurate text about deletion.
    [Show full text]
  • Surnamed Charitable Trusts.FINAL REVISED.Doccreated On: 2/10/2010 11:18:00 Amlast Printed: 2/10/2010 12:54:00 PM
    File: DRENNAN.Surnamed Charitable Trusts.FINAL REVISED.docCreated on: 2/10/2010 11:18:00 AMLast Printed: 2/10/2010 12:54:00 PM ALABAMA LAW REVIEW Volume 61 2010 Number 2 SURNAMED CHARITABLE TRUSTS: IMMORTALITY AT TAXPAYER EXPENSE William A. Drennan* I. THE NAME GAME: ALTRUISM TAINTED WITH NARCISSISM .......... 230 A. Praise by Association: Naming in General .......................... 230 B. New Empirical Evidence that Founders Surname Almost Eighty- Five Percent of Charitable Trusts .................................... 236 C. Immortality, Self-Aggrandizement, and Other Motives ............ 238 1. Possible Altruistic or Impersonal Motives ....................... 238 2. Immortality and Self-Aggrandizement ............................ 239 D. Charitable Trust Law Permits Surnames in Perpetuity ............ 240 E. Tax Law Considers Surnames Harmless ............................. 242 II. WHAT’S IN A NAME? THE POWER OF APPELLATION .................... 244 A. Naming Rights in the Great Debate on Charitable Tax Subsidies 244 1. Charitable Tax Benefits Are a Government Subsidy ........... 245 2. Tax Subsidies Should Be in Exchange for Public Benefits .... 247 B. Giving Narcissus His Due: Possible Benefits ........................ 251 C. Reflections on Narcissism as a Tragedy for Charitable Trusts .... 253 1. Structural Features that Reduce Public Benefits ................ 253 2. The Inefficiencies of Adulation .................................... 255 3. Discouraging Diversity and Community Involvement .......... 256 4. Inhibiting the Flow of Information
    [Show full text]