Search for: "In re Henry B." Results 241 - 260 of 501
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
12 Sep 2014, 5:04 am by Amy Howe
Briefly: In June, the Court held in Susan B. [read post]
7 Aug 2014, 12:40 pm by Stephen Bilkis
A Queens Family Lawyer said on February or April, 1998, X and A met at the Henry Street Settlement where they both worked. [read post]
7 Aug 2014, 12:21 pm by Rebecca Tushnet
1st Breakout Session: Trademark TheoryHarms, Benefits, and Justifications in Trademark LawStacey Dogan© and patent are often considered to be about incentives (getting benefits), but TM law in the general view is about preventing harm/misinformation, at least in theory; misinformation can harm both producers and consumers. [read post]
6 Jul 2014, 12:20 am
Henri Culot (Université Catholique de Louvain - Law) has published Les sanctions dans le droit de l'Organisation Mondiale du Commerce (Larcier 2014). [read post]
7 Apr 2014, 8:15 am by Camilla Alexandra Hrdy
[T]he combination of the fiction of separate inventorship and the use of prior invention as prior art means that Company M may obtain a patent only on A or on B even though its research effort and investment produced both. [read post]
5 Mar 2014, 9:13 am by Daniel Shaviro
            (ii) Debt versus equity – This is the re-delegation that failed. [read post]
7 Jan 2014, 8:49 am by Michael Markarian
As we look back on 2013 and head into the second part of the two-year Congress, we’re poised for significant gains on several priorities. [read post]
2 Dec 2013, 5:30 am by Mike Madison
 The only questions are who you’re serving and how. [read post]
6 Nov 2013, 2:04 pm by Buce
But re Jane Austen--this is not a complaint. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]