From Network Microeconomics to Network Infrastructure Emergence

Total Page:16

File Type:pdf, Size:1020Kb

From Network Microeconomics to Network Infrastructure Emergence From Network Microeconomics to Network Infrastructure Emergence V. Marbukh National Institute of Standards and Technology 100 Bureau Drive, Stop 8920 Gaithersburg, MD 20899-8920 [email protected] selfish investment in the network security [4] can be Abstract – This paper suggests that evolutionary models of affected if network users and providers have an option of network infrastructure in a market economy can be derived from the underlying selfish behavior of users and providers of network disconnecting from providers who create or propagating services in the same way as non-equilibrium thermodynamics is security risk. Another example is selfish investment in the derived from the underlying statistical physics of interacting bandwidth within existing infrastructure. The inefficiency particles. This approach may be useful for overcoming of the competitive equilibrium in the bandwidth pricings restrictions of existing models failing to account for the effect of and offerings [5] may be a result of inefficient network the details of user/provider selfish behavior on the infrastructure infrastructure, which prevents provider competition. In evolutionary path. Network security considerations may be a both examples provider ability to modify infrastructure part of this user/provider behavior. Our main assumption is may significantly affect the emerging network that “almost perfect competition” keeps the system close to infrastructure. the “social optimum”. This paper suggests that infrastructure evolutionary Keywords—network, economics, infrastructure, emergence. models can be derived from the underlying game-theoretic model of selfish user/provider behavior in the same way as non-equilibrium thermodynamics is derived from the I. INTRODUCTION underlying statistical physics of interacting particles. We In a market economy network evolution is driven by assume time scale separation between “fast” convergence to technological constraints and self-interests of the user/provider equilibrium for a given network infrastructure participants. Each user generates demand in attempt to and “slow” infrastructure evolution modeled by a Markov maximize its net utility, which is the difference between the process. We consider the situation of almost perfect utility of obtaining service and the service price while each competition in which a large number of providers compete service provider attempts to maximize its profit, which is for demand generated by the same users [6]. Based on the difference between its revenue and expenses. We results from economics [6], as well as results for some model a network by a capacitated graph with links/nodes particular networks [7]-[9], we conjecture that selfish owned by different providers. The key feature of our user/provider behavior maximizes the aggregate user utility model is that providers not only can expand/reduce subject to provider profitability. network capacity within the infrastructure represented by Exploiting similarities between utility maximization the network graph, but also have the option to modify the and entropy maximization in a closed physical system with network infrastructure by adding/eliminating network fixed energy [10], we propose to model the infrastructure links. While capacity expansion within a fixed evolution by a time-reversible Markov process. The infrastructure can be done at the marginal cost of the proposed model includes a possibility of selfish investment resources, growing network infrastructure by adding in network security and is open to various generalizations. links/nodes requires initial and typically significant The paper is organized as follows. Section II discusses investment, e.g., for putting fiber underground. user/provider competitive and socially optimal equilibria. This initial investment typically destroys convexity Section III proposes network infrastructure models and causes a multiplicity of Nash equilibrium consistent with the underlying selfish user/provider infrastructures in the natural game-theoretic formalization interactions. Finally, Section IV briefly summarizes and of the selfish user/provider behavior, making interpretation outlines directions of future research. of this game-theoretic model difficult. This difficulty has led to using game-theoretic models of selfish user/provider II. NETWORK ECONOMIC MODEL behavior only for fixed network infrastructure when the corresponding game typically has a unique Nash This Section describes economics driving user/provider equilibrium in demand, pricing, investments, and strategic interactions. Subsection A describes the network capacities. Separate modeling of infrastructure growth model. Subsection B describes the bandwidth typically relies on phenomenological random graph models supply/demand model. [1]-[3]. However, accounting for the effect of user/provider A. Network economic incentives on the network infrastructure We model the network by a directed capacitated graph evolution may be essential. For example, the result of with set of nodes N and set of links 1 = ∈ ∈ ∈ ≤ * φ = L {Lnk : n N,k N \ n} where links l Lnk directly Cnn C corresponding to processing cost nn (C) 0 if connect node n to node k . The network infrastructure is C ≤ C* , and φ (C) = ∞ if C > C* . In this paper we = nn determined by network graph g (N, L) and ownership of uniformly refer to network nodes and links as network = elements. network elements. Let snk dim{Lnk } be the number of links directly connecting node n to node k , and Cnk be the B. Bandwidth Users and Providers aggregate capacity of these links. We model the effect of investment in the network security Limited link capacities impose constraints on the feasible by assuming that traffic of rate x traversing network element end-to-end throughputs x from nodes n ∈ N to nodes (n,k ) l faces security risk xh (q) , where q = (q ,l ∈ L) is the ∈ l l k N \ n vector of levels of investment in the security of network = , (1) x(n,k ) ∑ xr elements l is. We assume functions hl (q) to be decreasing ⊂ r Rnk in all vector q components due to positive externalities, i.e., improving security of a network element not only improves = ≤ , (2) Yij ∑ xr Cij this element security; but also is beneficial for the security of ∈ ⊂ r:(i, j) r Rnk the entire network [4]. ∈ where Ynk is the aggregate rate through links l Lnk , vector Assuming that the owner of a network element l = ∈ x (xr ,r R) characterizes end-to-end flow rates on all charges users price pl for a unit of this element's feasible routes R = R , and the set of feasible routes bandwidth, the profit generated by network element l is n,k nk U f = ( p − q ) x −φ (c ) (4) from node n ∈ N to node k ∈ N \ n is R . l l l ∑ r ll l nk r:l∈r For simplicity of exposition we assume that all links Generally, there are S service providers, with service ∈ provider s ∈ S owning network elements l ∈ M . Each l Lnk directly connecting node n to node k are identical s with respect to their capacities: c = C s and carried network element is owned by some provider: M ≡ L . l nk nk Us∈S s = ∈ load: yl Ynk snk . In our economic model these Each provider s S attempts to maximize its aggregate profit assumptions are justifiable when the cost of providing = Fs ∑ fl (5) φ ∈ l∈M bandwidth c , is the same nk (c) , for all links l Lnk . In s this case bandwidth providers are inclined to charge the same We assume that each user is uniquely identified by the ∈ origin-destination pair (n,k),n ∈ N,k ∈ N \ n . Let price for bandwidth pnk on all links l Lnk and users are ∈ unk (x) be user (n,k) ’s utility of obtaining end-to-end indifferent to using links l Lnk [8]-[9]. Generalization to a case when the cost of providing bandwidth on different links bandwidth x from node n to node k . Utility functions ∈ u (x) are assumed to be monotonously increasing and l Lnk may be different is straightforward. nk ≥ We assume that bandwidth costs φ (c) are non- concave in x 0 at least in the case of file transfers. For nk example, weighted (α,w) - fair bandwidth allocation [12] is decreasing in c ≥ 0 . Communication bandwidth costs based on user utilities φ (c); n ∈ N,k ∈ N \ n are concave in c ≥ 0 , e.g., −α nk ⎧w x1 (1−α) if α ≠ 1 u(xα,w) = (6) φ = + ∈ ∈ ⎨ α = nk (c) ank bnkc, n N,k N \ n (3) ⎩ wln x if 1 α > ≥ where ,w 0 are some parameters. In a particular case of where ank 0 characterizes the fixed cost, e.g., cost of proportional fairness, when α = 1, parameters w = w can putting the fiber underground and b ≥ 0 characterizes the nk nk be interpreted as user (n,k) ’s willingness to pay for end-to- marginal capacity cost. end bandwidth x from node n to node k . Our model can be easily generalized to incorporate User (n,k) net utility is its gross utility of having end-to- constraints imposed by limited node processing capacity end bandwidth minus expenses and expected losses due to , ∈ . It is natural to assume that costs of the Cnn n N security risks: φ ∈ ≥ processing bandwidths nn (C),n N are convex in C 0 ⎛ ⎞ = ⎜ ⎟ − []+η due to technological constraints. For example, considered in U nk unk ∑ xr ∑∑xr pl nk hl (q) (7) ⎜ ∈ ⎟ ∈∈ [11] is the case of hard processing bandwidth constraints ⎝ r Rnk ⎠ rrRnk l 2 where parameter η ≥ 0 quantifies user (n,k) ’s sensitivity nk B. Competitive Equilibria to the security risk. Each user (n,k) attempts to maximize Consider a non-cooperative game of providers ∈ its net utility (7) over the vector of flow rates (x ,r ∈ R ) , s S r st attempting to maximize their profits = ∈ * * given security risks h (hl ,l L) and prices = (15) Fs ( p,q) ∑ fl ( p,q) = ∈ l∈M p ( pl ,l L) . s over pricing pl , and investment in security ql of their assets III.
Recommended publications
  • Deflation: a Business Perspective
    Deflation: a business perspective Prepared by the Corporate Economists Advisory Group Introduction Early in 2003, ICC's Corporate Economists Advisory Group discussed the risk of deflation in some of the world's major economies, and possible consequences for business. The fear was that historically low levels of inflation and faltering economic growth could lead to deflation - a persistent decline in the general level of prices - which in turn could trigger economic depression, with widespread company and bank failures, a collapse in world trade, mass unemployment and years of shrinking economic activity. While the risk of deflation is now remote in most countries - given the increasingly unambiguous signs of global economic recovery - its potential costs are very high and would directly affect companies. This issues paper was developed to help companies better understand the phenomenon of deflation, and to give them practical guidance on possible measures to take if and when the threat of deflation turns into reality on a future occasion. What is deflation? Deflation is defined as a sustained fall in an aggregate measure of prices (such as the consumer price index). By this definition, changes in prices in one economic sector or falling prices over short periods (e.g., one or two quarters) do not qualify as deflation. Dec lining prices can be driven by an increase in supply due to technological innovation and rapid productivity gains. These supply-induced shocks are usually not problematic and can even be accompanied by robust growth, as experienced by China. A fall in prices led by a drop in demand - due to a severe economic cycle, tight economic policies or a demand-side shock - or by persistent excess capacity can be much more harmful, and is more likely to lead to persistent deflation.
    [Show full text]
  • Carbonomics Innovation, Deflation and Affordable De-Carbonization
    EQUITY RESEARCH | October 13, 2020 | 9:24PM BST Carbonomics Innovation, Deflation and Affordable De-carbonization Net zero is becoming more affordable as technological and financial innovation, supported by policy, are flattening the de-carbonization cost curve. We update our 2019 Carbonomics cost curve to reflect innovation across c.100 different technologies to de- carbonize power, mobility, buildings, agriculture and industry, and draw three key conclusions: 1) low-cost de-carbonization technologies (mostly renewable power) continue to improve consistently through scale, reducing the lower half of the cost curve by 20% on average vs. our 2019 cost curve; 2) clean hydrogen emerges as the breakthrough technology in the upper half of the cost curve, lowering the cost of de-carbonizing emissions in more difficult sectors (industry, heating, heavy transport) by 30% and increasing the proportion of abatable emissions from 75% to 85% of total emissions; and 3) financial innovation and a lower cost of capital for low-carbon activities have driven around one-third of renewables cost deflation since 2010, highlighting the importance of shareholder engagement in climate change, monetary stimulus and stable regulatory frameworks. The result of these developments is very encouraging, shaving US$1 tn pa from the cost of the path towards net zero and creating a broader connected ecosystem for de- carbonization that includes renewables, clean hydrogen (both blue and green), batteries and carbon capture. Michele Della Vigna, CFA Zoe Stavrinou Alberto Gandolfi +44 20 7552-9383 +44 20 7051-2816 +44 20 7552-2539 [email protected] [email protected] alberto.gandolfi@gs.com Goldman Sachs International Goldman Sachs International Goldman Sachs International Goldman Sachs does and seeks to do business with companies covered in its research reports.
    [Show full text]
  • The Great Divergence the Princeton Economic History
    THE GREAT DIVERGENCE THE PRINCETON ECONOMIC HISTORY OF THE WESTERN WORLD Joel Mokyr, Editor Growth in a Traditional Society: The French Countryside, 1450–1815, by Philip T. Hoffman The Vanishing Irish: Households, Migration, and the Rural Economy in Ireland, 1850–1914, by Timothy W. Guinnane Black ’47 and Beyond: The Great Irish Famine in History, Economy, and Memory, by Cormac k Gráda The Great Divergence: China, Europe, and the Making of the Modern World Economy, by Kenneth Pomeranz THE GREAT DIVERGENCE CHINA, EUROPE, AND THE MAKING OF THE MODERN WORLD ECONOMY Kenneth Pomeranz PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD COPYRIGHT 2000 BY PRINCETON UNIVERSITY PRESS PUBLISHED BY PRINCETON UNIVERSITY PRESS, 41 WILLIAM STREET, PRINCETON, NEW JERSEY 08540 IN THE UNITED KINGDOM: PRINCETON UNIVERSITY PRESS, 3 MARKET PLACE, WOODSTOCK, OXFORDSHIRE OX20 1SY ALL RIGHTS RESERVED LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA POMERANZ, KENNETH THE GREAT DIVERGENCE : CHINA, EUROPE, AND THE MAKING OF THE MODERN WORLD ECONOMY / KENNETH POMERANZ. P. CM. — (THE PRINCETON ECONOMIC HISTORY OF THE WESTERN WORLD) INCLUDES BIBLIOGRAPHICAL REFERENCES AND INDEX. ISBN 0-691-00543-5 (CL : ALK. PAPER) 1. EUROPE—ECONOMIC CONDITIONS—18TH CENTURY. 2. EUROPE—ECONOMIC CONDITIONS—19TH CENTURY. 3. CHINA— ECONOMIC CONDITIONS—1644–1912. 4. ECONOMIC DEVELOPMENT—HISTORY. 5. COMPARATIVE ECONOMICS. I. TITLE. II. SERIES. HC240.P5965 2000 337—DC21 99-27681 THIS BOOK HAS BEEN COMPOSED IN TIMES ROMAN THE PAPER USED IN THIS PUBLICATION MEETS THE MINIMUM REQUIREMENTS OF ANSI/NISO Z39.48-1992 (R1997) (PERMANENCE OF PAPER) WWW.PUP.PRINCETON.EDU PRINTED IN THE UNITED STATES OF AMERICA 3579108642 Disclaimer: Some images in the original version of this book are not available for inclusion in the eBook.
    [Show full text]
  • The First Great Divergence
    Mellon-Sawyer Seminar 2007/8 “The first great divergence: China and Europe, 500-800 CE” Organized by Ian Morris, Walter Scheidel, and Mark Lewis, Departments of Classics and History, Stanford University Sponsored by the Andrew W. Mellon Foundation Six hundred years ago China was the most powerful state on earth. The eunuch admiral Zheng He spent 1406 cruising around the Indian Ocean at the head of 30,000 crew in a fleet of giant Chinese “treasure ships,” trading, collecting tribute, and setting up and deposing client kings at will. By 1433, Chinese ships were visiting Arabia, Ethiopia, and Kenya, and probably Australia too. By any reasonable estimate, China seemed set to become the world’s first global power. But that did not happen. Anti-trade Confucian factions won out in struggles at the Ming court, and long-distance voyages were banned. By 1467, most records of Zheng’s voyages were lost or destroyed. Half a millennium later, far from dominating as the world, China seemed – at least to western observers – to be going backward. When a dispute over opium trading escalated uncontrollably in 1839, the British sent a small naval force to claim damages from the governor of Canton. A single ironclad gunboat blasted its way through all the Chinese defenses, and in 1842, with the Grand Canal under British control, Nanjing facing plunder, and famine closing in on Beijing, China conceded British demands for open ports and the right to send missionaries deep into the country. This defeat triggered crises that brought China to the verge of partition. One Hong Xiuquan, a failed civil service candidate who developed his own bizarre version of Christianity out of the teachings of the missionaries at Canton, led the massive Taiping Rebellion to install a Heavenly Kingdom of Great Peace.
    [Show full text]
  • The Keynesian Model in the General Theory: a Tutorial
    The Keynesian Model in the General Theory: A Tutorial Raúl Rojas Freie Universität Berlin January 2012 This small overview of the General Theory is the kind of summary I would have liked to have read, before embarking in a comprehensive study of the General Theory at the time I was a student. As shown here, the main ideas are quite simple and easy to visualize. Unfortunately, numerous introductions to Keynesian theory are not actually based on Keynes opus magnum, but in obscure neo‐classical reinterpretations. This is completely pointless since Keynes’ book is so readable. Introduction John Maynard Keynes (1883‐1946) completed the General Theory of Employment, Interest, and Money [1] in December of 1935, right in the middle of the Great Depression. At that point, millions of workers in the US and Europe had been unemployed for years, and economic orthodoxy could not account for this “anomalous” situation. Keynes’ General Theory tries to tackle exactly this problem. Keynes rejected classical theories based on the idea that production creates its own demand, that is, that the economy always recovers to full employment after a shock. Therefore, Keynes called his treatise the General Theory because he conceived classical doctrine as only a special case of a more complete approach: “The classical theorists resemble Euclidean geometers in a non‐Euclidean world who, discovering that in experience straight lines apparently parallel often meet, rebuke the lines for not keeping straight (...) Yet, in truth, there is no remedy except to throw over the axiom of parallels and to work out a non‐Euclidean geometry.
    [Show full text]
  • A Primer on Modern Monetary Theory
    2021 A Primer on Modern Monetary Theory Steven Globerman fraserinstitute.org Contents Executive Summary / i 1. Introducing Modern Monetary Theory / 1 2. Implementing MMT / 4 3. Has Canada Adopted MMT? / 10 4. Proposed Economic and Social Justifications for MMT / 17 5. MMT and Inflation / 23 Concluding Comments / 27 References / 29 About the author / 33 Acknowledgments / 33 Publishing information / 34 Supporting the Fraser Institute / 35 Purpose, funding, and independence / 35 About the Fraser Institute / 36 Editorial Advisory Board / 37 fraserinstitute.org fraserinstitute.org Executive Summary Modern Monetary Theory (MMT) is a policy model for funding govern- ment spending. While MMT is not new, it has recently received wide- spread attention, particularly as government spending has increased dramatically in response to the ongoing COVID-19 crisis and concerns grow about how to pay for this increased spending. The essential message of MMT is that there is no financial constraint on government spending as long as a country is a sovereign issuer of cur- rency and does not tie the value of its currency to another currency. Both Canada and the US are examples of countries that are sovereign issuers of currency. In principle, being a sovereign issuer of currency endows the government with the ability to borrow money from the country’s cen- tral bank. The central bank can effectively credit the government’s bank account at the central bank for an unlimited amount of money without either charging the government interest or, indeed, demanding repayment of the government bonds the central bank has acquired. In 2020, the cen- tral banks in both Canada and the US bought a disproportionately large share of government bonds compared to previous years, which has led some observers to argue that the governments of Canada and the United States are practicing MMT.
    [Show full text]
  • The Impact of Inflation on Social Security Benefits
    RETIREMENT RESEARCH August 2021, Number 21-14 THE IMPACT OF INFLATION ON SOCIAL SECURITY BENEFITS By Alicia H. Munnell and Patrick Hubbard* Introduction This fall, the U.S. Social Security Administration is The third section explores how inflation affects the likely to announce that benefits will be increased by taxation of benefits. The final section concludes that, around 6 percent beginning January 1, 2022. This while the inflation adjustment in Social Security is ex- cost-of-living-adjustment (COLA), which would be tremely valuable, the rise in Medicare premiums and the largest in 40 years, is an important reminder that the extension of taxation under the personal income keeping pace with inflation is one of the attributes tax limits the ability of beneficiaries to fully maintain that makes Social Security benefits such a unique their purchasing power. source of retirement income. A spurt in inflation, however, affects two other factors that determine the net amount that retirees Social Security’s COLA receive from Social Security. The first is the Medicare premiums for Part B, which are deducted automati- Social Security benefits are subject each year to a 1 cally from Social Security benefits. To the extent that COLA. This adjustment, based on the change in the premiums rise faster than the COLA, the net benefit Consumer Price Index for Urban Wage Earners and will not keep pace with inflation. The second issue Clerical Workers (CPI-W) over the last year, protects pertains to taxation under the personal income tax. beneficiaries against the effects of inflation. Without Because taxes are levied on Social Security benefits such automatic adjustments, the government would only for households with income above certain have to make frequent changes to benefits to prevent 2 thresholds ($25,000 for single taxpayers and $32,000 retirees’ standard of living from eroding as they age.
    [Show full text]
  • The Basic Economics of Internet Infrastructure
    Journal of Economic Perspectives—Volume 34, Number 2—Spring 2020—Pages 192–214 The Basic Economics of Internet Infrastructure Shane Greenstein his internet barely existed in a commercial sense 25 years ago. In the mid- 1990s, when the data packets travelled to users over dial-up, the main internet T traffic consisted of email, file transfer, and a few web applications. For such content, users typically could tolerate delays. Of course, the internet today is a vast and interconnected system of software applications and computing devices, which society uses to exchange information and services to support business, shopping, and leisure. Not only does data traffic for streaming, video, and gaming applications comprise the majority of traffic for internet service providers and reach users primarily through broadband lines, but typically those users would not tolerate delays in these applica- tions (for usage statistics, see Nevo, Turner, and Williams 2016; McManus et al. 2018; Huston 2017). In recent years, the rise of smartphones and Wi-Fi access has supported growth of an enormous range of new businesses in the “sharing economy” (like, Uber, Lyft, and Airbnb), in mobile information services (like, social media, ticketing, and messaging), and in many other applications. More than 80 percent of US households own at least one smartphone, rising from virtually zero in 2007 (available at the Pew Research Center 2019 Mobile Fact Sheet). More than 86 percent of homes with access to broadband internet employ some form of Wi-Fi for accessing applications (Internet and Television Association 2018). It seems likely that standard procedures for GDP accounting underestimate the output of the internet, including the output affiliated with “free” goods and the restructuring of economic activity wrought by changes in the composition of firms who use advertising (for discussion, see Nakamura, Samuels, and Soloveichik ■ Shane Greenstein is the Martin Marshall Professor of Business Administration, Harvard Business School, Boston, Massachusetts.
    [Show full text]
  • Modern Monetary Theory: a Marxist Critique
    Class, Race and Corporate Power Volume 7 Issue 1 Article 1 2019 Modern Monetary Theory: A Marxist Critique Michael Roberts [email protected] Follow this and additional works at: https://digitalcommons.fiu.edu/classracecorporatepower Part of the Economics Commons Recommended Citation Roberts, Michael (2019) "Modern Monetary Theory: A Marxist Critique," Class, Race and Corporate Power: Vol. 7 : Iss. 1 , Article 1. DOI: 10.25148/CRCP.7.1.008316 Available at: https://digitalcommons.fiu.edu/classracecorporatepower/vol7/iss1/1 This work is brought to you for free and open access by the College of Arts, Sciences & Education at FIU Digital Commons. It has been accepted for inclusion in Class, Race and Corporate Power by an authorized administrator of FIU Digital Commons. For more information, please contact [email protected]. Modern Monetary Theory: A Marxist Critique Abstract Compiled from a series of blog posts which can be found at "The Next Recession." Modern monetary theory (MMT) has become flavor of the time among many leftist economic views in recent years. MMT has some traction in the left as it appears to offer theoretical support for policies of fiscal spending funded yb central bank money and running up budget deficits and public debt without earf of crises – and thus backing policies of government spending on infrastructure projects, job creation and industry in direct contrast to neoliberal mainstream policies of austerity and minimal government intervention. Here I will offer my view on the worth of MMT and its policy implications for the labor movement. First, I’ll try and give broad outline to bring out the similarities and difference with Marx’s monetary theory.
    [Show full text]
  • Employment Situation of Veterans — 2020
    For release 10:00 a.m. (ET) Thursday, March 18, 2021 USDL-21-0438 Technical information: (202) 691-6378 • [email protected] • www.bls.gov/cps Media contact: (202) 691-5902 • [email protected] EMPLOYMENT SITUATION OF VETERANS — 2020 The unemployment rate for veterans who served on active duty in the U.S. Armed Forces at any time since September 2001—a group referred to as Gulf War-era II veterans—rose to 7.3 percent in 2020, the U.S. Bureau of Labor Statistics reported today. The jobless rate for all veterans increased to 6.5 percent in 2020. These increases reflect the effect of the coronavirus (COVID- 19) pandemic on the labor market. In August 2020, 40 percent of Gulf War-era II veterans had a service-connected disability, compared with 26 percent of all veterans. This information was obtained from the Current Population Survey (CPS), a monthly sample survey of about 60,000 eligible households that provides data on employment, unemployment, and persons not in the labor force in the United States. Data about veterans are collected monthly in the CPS; these monthly data are the source of the 2020 annual averages presented in this news release. In August 2020, a supplement to the CPS collected additional information about veterans on topics such as service-connected disability and veterans' current or past Reserve or National Guard membership. Information from the supplement is also presented in this news release. The supplement was co-sponsored by the U.S. Department of Veterans Affairs and the U.S. Department of Labor's Veterans' Employment and Training Service.
    [Show full text]
  • What Is Unemployment Insurance (Ui)? Am I Eligible? How Do I Apply?
    WHAT IS UNEMPLOYMENT INSURANCE (UI)? Unemployment Insurance is a joint state-federal program that provides cash benefits to eligible workers. Each state administers UI Benefits are Administered by States a separate UI program, but all states follow the same guidelines established by federal law. To find information about your state’s program, including eligibility, benefits, Unemployment insurance payments (benefits) are intended to and application information, visit our provide temporary financial assistance to unemployed workers Unemployment Insurance Service who are unemployed through no fault of their own. Each state Locator. sets its own additional requirements for eligibility, benefit amounts, and length of time benefits can be paid. Generally, benefits are based on a percentage of your earnings over a recent 52-week period, and each state sets a maximum amount. Benefits are subject to federal and most state income taxes and must be reported on your income tax return. You may choose to have the tax withheld from your payment. AM I ELIGIBLE? Each state sets its own guidelines for eligibility for UI benefits, but you usually qualify if you: Are unemployed through no fault of your own. In most states, this means you have to have separated from your last job due to a lack of available work. Meet work and wage requirements. You must meet your state’s requirements for wages earned or time worked during an established period of time referred to as a "base period." (In most states, this is usually the first four out of the last five completed calendar quarters prior to the time that your claim is filed.) Meet any additional state requirements.
    [Show full text]
  • A Glossary of Fiscal Terms & Acronyms
    AUGUST7,1998VOLUME13,NO .VII A Publication of the House Fiscal Analysis Department on Government Finance Issues A GLOSSARY OF FISCAL TERMS & ACRONYMS 1998 Revised Edition Abstract. This issue of Money Matters is a resource document containing terms and acronyms commonly used by and in legislative fiscal committees and in the discussion of state budget and tax issues. The first section contains terms and abbreviations used in all fiscal committees and divisions. The remaining sections contain terms for particular budget categories and accounts, organized according to fiscal subject areas. This edition has new sections containing economic development, family and early childhood, and housing terms and acronyms. The other sections are revised and updated to reflect changes in terminology, particularly the human services section. For further information, contact the Chief Fiscal Analyst or the fiscal analyst assigned to the respective House fiscal committee or division. A directory of House Fiscal Analysis Department personnel and their committee/division assignments for the 1998 legislative session appears on the next page. Originally issued January 1997 Revised August 1998 House Fiscal Analysis Department Staff Assignments — 1998 Session Committee/Division Fiscal Analyst Telephone Room Chief Fiscal Analyst Bill Marx 296-7176 373 Capital Investment John Walz 296-8236 376 EDIT— Economic Development Finance CJ Eisenbarth Hager 296-5813 428 EDIT— Housing Finance Cynthia Coronado 296-5384 361 Environment & Natural Resources Finance Jim Reinholdz 296-4119 370 Education — Higher Education Finance Doug Berg 296-5346 372 K-12 Education Finance Greg Crowe 296-7165 378 Family & Early Childhood Finance Cynthia Coronado 296-5384 361 Health & Human Services Finance Joe Flores 296-5483 385 Judiciary Finance Gary Karger 296-4181 383 State Government Finance Helen Roberts 296-4117 374 Transportation Finance John Walz 296-8236 376 Taxes — Income, sales, misc.
    [Show full text]