Search for: "Hale v. Hale" Results 1461 - 1470 of 1,470
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Jan 2019, 2:26 pm by Lev Sugarman
Fellowship Info The Nancy Hale Fellows Program is a full-time, 12-month program that comes with a $50,000 annual stipend and two weeks paid vacation, plus healthcare and benefits. [read post]
29 Jul 2022, 6:15 am by Tess Graham
Since early 2022, Just Security has published more than 100 articles analyzing the diplomatic, political, legal, economic, humanitarian, and other issues and consequences of Russia’s war on Ukraine. [read post]
19 Apr 2008, 8:50 am
(Laura Empson of Cass Business School gave a particularly nice presentation on this at lunchtime Thursday, positing that useful ways of thinking about partnership might be as analogous to The Three Musketeers, to Henry V's famous "band of brothers" speech before the Battle of Agincourt, to a buccaneer pirate ship, or, at last, to "Gone With the Wind. [read post]
8 Jul 2010, 7:22 am by Frank Pasquale
But at least since legal realist Robert Hale published his Coercion and Distribution in a Supposedly Non-Coercive State in 1923, the question of what constitutes state "intervention" in the market has been contestable. [read post]
4 Feb 2019, 6:00 am by Lev Sugarman
Event Announcements (More details on the Events Calendar) Tuesday, Feb. 5 at 10:30 a.m.: The Center for Strategic and International Studies will host an event on the digital dimensions of the Chinese Belt and Road Initiative entitled China’s Digital Silk Road. [read post]
2 Dec 2019, 12:25 pm by Gordon Ahl
The committee will hear testimony from David Hale, the undersecretary of state for political affairs, and Christopher A. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]