How to Avoid Implementing Today’s Wrong Policies to Solve Yesterday’s Corporate Governance Problems
In response to Barry E. Adler & Marcel Kahan, The Technology of Creditor Protection, 161 U. Pa. L. Rev. 1773… Continue reading →
In response to Barry E. Adler & Marcel Kahan, The Technology of Creditor Protection, 161 U. Pa. L. Rev. 1773… Continue reading →
In response to William W. Bratton & Michael L. Wachter, A Theory of Preferred Stock, 161 U. Pa. L. Rev.… Continue reading →
In response to Barry E. Adler & Marcel Kahan, The Technology of Creditor Protection, 161 U. Pa. L. Rev. 1773… Continue reading →
In his Response to Professor Hurwitz, Professor Kang contests Hurwitz’s claim that active intermediaries are the dominant source of increasing… Continue reading →
In this Response to Professor Burk, I consider the ways in which IP law can address the IP questions raised… Continue reading →
Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend… Continue reading →
An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet’s success. In… Continue reading →
In response to Barry E. Adler & Marcel Kahan, The Technology of Creditor Protection, 161 U. Pa. L. Rev. 1773… Continue reading →
Contract is the primary means through which creditors control a firm’s debt– equity conflict. There is an irony here, however.… Continue reading →
One of the central questions in free speech jurisprudence is what activities the First Amendment encompasses. This Article considers that… Continue reading →