Search for: "People v. White (1986)" Results 161 - 180 of 311
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Feb 2015, 2:56 pm
Whether to preserve, reverse, or modify the circuit law created by Kellerthus merits this Court’s en banc attention — especially since this Court is the “Court of Appeals for the Hollywood Circuit,” White v. [read post]
20 Jan 2015, 10:10 pm by Old Fox
"Court documents in the 1986 attack identify Wahlberg among a group of white boys who harassed the school group as they were leaving Savin Hill Beach in Dorchester, a mixed but segregated Boston neighborhood that had seen racial tensions during the years the city was under court-ordered school integration.The boys chased the black children down the street, repeatedly shouting "n-----" and hurling rocks until an ambulance driver intervened. [read post]
24 Dec 2014, 4:37 am
., told Bell Rainey commented to her that he thought she had `”messed” with some nasty people’ and suggested that he otherwise would have, in S.S.'s words, `turn[ed][her] back “straight” from being “gay. [read post]
7 Nov 2014, 5:52 am
 A warning about an inherent risk – a so-called “risk warning” – serves an entirely different purpose.With inherent risks, people are warned so they can decide whether that risk outweighs the benefits that might be gained from using the product. [read post]
10 Jun 2014, 8:27 am by Rebecca Tushnet
  Padmapper ordered data geographically to help people find apartments. [read post]
31 May 2014, 1:34 pm by Michael Lowe
  Common street names include: Blue Silk, Cloud Nine, Drone,  Energy-1, Ivory Wave, Lunar Wave, Meow Meow, Ocean Burst, Pure Ivory, Purple Wave, Red Dove, Snow Leopard, Stardust, Vanilla Sky, White Dove, White Knight, and White Lightening. [read post]
26 Dec 2013, 7:05 am by David Markus
” And when threats of draconian sentences compel guilty pleas, “some innocent people will plead guilty. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]