Search for: "ROBERTS v. HUMPHREYS" Results 121 - 130 of 130
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
13 Oct 2007, 9:18 am
"  Elk's testimony about his conversation with Humphreys was substantially the same. [read post]
5 Jan 2017, 2:22 pm by Robert B. Milligan
While the circuit court split continues to widen regarding the interpretation of unauthorized access under the Computer Fraud and Abuse Act, the recent decision in U.S. v. [read post]
5 Jan 2017, 2:22 pm by Robert B. Milligan
While the circuit court split continues to widen regarding the interpretation of unauthorized access under the Computer Fraud and Abuse Act, the recent decision in U.S. v. [read post]
24 Apr 2014, 6:59 am
Professor Barnett builds his radically individualistic view of popular sovereignty on Chisholm v. [read post]
14 May 2019, 7:29 am by Andrew Hamm
Nixon doubled down on the Southern Strategy during the general election, capturing six southern states compared to one for Democrat Hubert Humphrey. [read post]
5 Apr 2017, 3:01 am by David Meyer Lindenberg
The first words out of my mouth were, “Did Humphrey do it? [read post]
2 Jul 2013, 1:41 pm
The other day, I was blogging about tags, and somebody asked what are all the tags. [read post]
27 Dec 2008, 10:19 am
. * 162 BC: Eleazar Maccabeus was crushed to death at the Battle of Beth-zechariah by a War elephant that he believed to be carrying Seleucid King Antiochus V; charging in to battle, Eleazar rushed underneath the elephant and thrust a spear into its belly, whereupon it fell dead on top of him * 4 BC: Herod the Great suffered from fever, intense rashes, colon pains, foot drop, inflammation of the abdomen, a putrefaction of his genitals that produced worms, convulsions, and difficulty… [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]