Search for: "Douglas Cunningham" Results 61 - 68 of 68
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Aug 2018, 2:59 pm by Bridget Crawford
Below the fold are the results of the 2018-2019 Law Professor Twitter Census. [read post]
23 Jan 2015, 4:44 am by Bridget Crawford
Cooper jennifercooper Seattle Caroline Mala Corbin CarolineMCorbin Miami Nathan Cortez nathancortez SMU Brenda Cossman BrendaCossman Toronto Adam Cox adambcox NYU Carys Craig CraigCarys Osgoode Hall Bridget Crawford profbcrawford Pace Susan Crawford scrawford Cardozo Dennis Crouch patentlyo Missouri César Cuauhtémoc Garcia Hernandez crimmigration Capital Emma Cunliffe emmajcunliffe Univ British Columbia Lawrence Cunningham CunninghamProf George Washington Karen Czapanskiy… [read post]
6 Feb 2015, 6:00 am by Bridget Crawford
Cooper jennifercooper Seattle Sarah Lucy Cooper SarahLucyCoope1 Birmingham City (UK) Caroline Mala Corbin CarolineMCorbin Miami Richard  Cornes  CornesLawNZUK  Essex (UK) Nathan Cortez nathancortez SMU Brenda Cossman BrendaCossman Toronto Adam Cox adambcox NYU Carys Craig CraigCarys Osgoode Hall Bridget Crawford profbcrawford Pace Susan Crawford scrawford Cardozo Dennis Crouch patentlyo Missouri César Cuauhtémoc Garcia Hernandez crimmigration Capital Emma Cunliffe… [read post]
24 Apr 2020, 3:00 am by Jim Sedor
National/Federal A Watchdog Out of Trump’s Grasp Unleashes Wave of Coronavirus Audits Politico – Kyle Cheney | Published: 4/20/2020 Lawmakers handed President Trump $2 trillion in coronavirus relief and then left town without activating any of the powerful new oversight tools meant to hold his administration accountable. [read post]
8 May 2020, 3:00 am by Jim Sedor
National/Federal Both Parties Wonder: How much do conventions even matter anymore? [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]