Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Science and Technology Law

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler Jul 2015

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler

William K. Ford

Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …


Freedom In My Heart, Karen Sandler Jun 2015

Freedom In My Heart, Karen Sandler

Events

No abstract provided.


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


New Start From Old Beginnings?, Michaela Ruhlmann Apr 2015

New Start From Old Beginnings?, Michaela Ruhlmann

History Capstone Research Papers

This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its actual …


Shadow Dwellers: The Underregulated World Of State And Local Dna Databases, Stephen Mercer, Jessica D. Gabel Feb 2015

Shadow Dwellers: The Underregulated World Of State And Local Dna Databases, Stephen Mercer, Jessica D. Gabel

Jessica Gabel Cino

No abstract provided.


Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman Feb 2015

Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The U.S. Government faces acute budgetary deficits and national debt problems in the Obama Administration. These problems have been brought about by decades of unsustainable government spending affecting all agencies including the National Aeronautics and Space Administration. (NASA). An outgrowth of this fiscal profligacy is the presence of wasteful and duplicative programs within NASA that prevent this agency from achieving its space science and human spaceflight objectives. These problems occur due to mismanagement of these programs from NASA and the creation of these programs by the U.S. Congress and congressional committees. This occurs because congressional appropriators tend to be more …


Creative Copyright: Tailoring Intellectual Property Policies And Business Strategies For Creative Content Industries In The Digital Age, Bhamati Viswanathan Jan 2015

Creative Copyright: Tailoring Intellectual Property Policies And Business Strategies For Creative Content Industries In The Digital Age, Bhamati Viswanathan

SJD Dissertations

My dissertation explores intellectual property rights in three fields: fashion, music and education. I examine the varying degrees of IP rights in those fields, and ask whether the differing levels of rights are appropriate to keep these industries creative, innovative and robust. I further examine the salient characteristics of those rights and ask whether such an understanding might help to determine optimal levels of IP protection in other creative industries.


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.