Search for: "WHITTAKER v. WHITE" Results 1 - 16 of 16
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
31 Aug 2010, 9:34 pm by Lawrence Cunningham
   Contemporaries were in on it too, with Justice White using such words in 1962’s DrakeBakeries, and Justice Harlan in 1964’s Wiley & Sons v. [read post]
12 Jan 2012, 12:35 pm by Jess Bravin
Justice Stevens saves his greatest ire, however, for Justice Douglas’s most famous opinion, Griswold v. [read post]
1 Dec 2007, 12:37 pm
I also received this link of a background check done on the founder.Xavier Von Erck - Phillip John Eide - Portland ORPhoebus Apollo - Nicholas Wilkins - Portland ORDel Harvey - Alison Shea - Pasadena, CAFrag Off - Dennis Kerr - Redondo Beach, CABeef the Troll - James J Schweitzer - WIRed Baroness - Tobi Schweitzer - WIDuncan Hines - Zelpha Long - CO or ARCheyenne White/Sugarbella - Tracy GrygielMrs Dash/ Talon - Allyson EberAlmond Joy/Jingles - Susie GrahamFreddo Frog/Bagerfan - Dennis… [read post]
28 Aug 2018, 8:13 am by Carolyn Shapiro
The year before Harlan’s nomination the Supreme Court decided Brown v. [read post]
17 Dec 2019, 12:15 pm by Ronald Collins
In part it was, as we say in the book, one of the Warren Court’s weapons against state criminal-justice systems that were engines of white supremacy or, at least, badly dysfunctional. [read post]
30 May 2007, 11:50 pm
Moreover, once Goldberg replaced Frankfurter and White replaced Whittaker in 1962, there was a six person liberal majority for civil rights legislation (I should note, however, that one of the six, Hugo Black, dissented in South Carolina v. [read post]
14 May 2019, 7:29 am by Andrew Hamm
John Kennedy selected Byron White, another centrist. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]