Netherlands: Proportionality of ISP’s Obligation to Transfer Client Data to IP Rightholder – a Promusicae like case

2021 ◽  
Vol 22 (5) ◽  
pp. 155-159
Author(s):  
Anja Dekhuijzen
Keyword(s):  
CFA Magazine ◽  
2013 ◽  
Vol 24 (6) ◽  
pp. 30-31
Author(s):  
Ed McCarthy
Keyword(s):  

Author(s):  
Abdelhak Bentaleb ◽  
May Lim ◽  
Mehmet N. Akcay ◽  
Ali C. Begen ◽  
Roger Zimmermann
Keyword(s):  

2020 ◽  
Vol 35 (3) ◽  
pp. 1-23
Author(s):  
A. Faye Borthick ◽  
Lucia N. Smeal

ABSTRACT This case prompts learners to analyze compensation data and worker agreements to assess a company's likely compliance with requirements for classifying workers as independent contractors rather than employees based on the factors the Internal Revenue Service (IRS) uses for compliance with IRS Rev. Rul. 87-41 and Treas. Reg. § 31.3401(c)-1. Students combine tax research and data analysis to identify risky employment practices, recommend corrective action to bring the company into compliance, and estimate potential penalties if the IRS were to declare the company not in compliance. Students complete a data analysis report as a basis for preparing a research memorandum. Students electing tax practice will need to be able to perform similar analyses of client data in advance of IRS audits given that the IRS analyzes accounting data when auditing taxpayers. Given the guidance in the Teaching Notes, no database query experience is necessary on the part of instructors.


Author(s):  
Carol Hubberstey ◽  
Deborah Rutman ◽  
Rose A. Schmidt ◽  
Marilyn Van Bibber ◽  
Nancy Poole

Within Canada, several specialized multi-service prevention programs work with highly vulnerable pregnant and early parenting women with substance use issues. Experiences of trauma, mental health, poverty, and other factors associated with the social determinants of health complete the picture. Program evaluations have demonstrated their value, but less has been said as to women’s reasons for choosing to seek help from these programs, what they were hoping to gain, or what difference they believe has occurred as a result. The Co-creating Evidence project is a multi-year (2017–2020) national evaluation of holistic programs serving women at high risk of having an infant with prenatal alcohol or substance exposure. The evaluation uses a mixed methods design involving quarterly program output and “snapshot” client data, as well as in-person, semi-structured interviews and questionnaires with clients, program staff, and program partners. This article presents findings from interviews with women regarding why they sought help, how they used the services, and what they perceived to be the most significant change in their lives as a result. Obtaining help with substance use was the top theme for what women hoped to get from their participation in their program; however, women’s reasons were often intertwined. Additional motivations included wanting information, support or assistance with: child welfare; pregnancy; housing; getting connected to health care or prenatal care; and opportunities for peer support. With respect to the most significant life change, themes included: reduced substance use; improved housing; stronger mother–child connection; and improved wellness and social connections. Findings demonstrated that vulnerable, marginalized pregnant and parenting women who are using substances will seek help when health and social care services are configured in such a way as to take into consideration and address their unique roles, responsibilities, and realities.


2009 ◽  
pp. 3021-3030
Author(s):  
Shin Parker ◽  
Zhengxin Chen

Data management in mobile computing has emerged as a major research area, and it has found many applications. This research has produced interesting results in areas such as data dissemination over limited bandwidth channels, location- dependent querying of data, and advanced interfaces for mobile computers (Barbara, 1999). However, handling multimedia objects in mobile environments faces numerous challenges. Traditional methods developed for transaction processing (Silberschatz, Korth & Sudarshan, 2001) such as concurrency control and recovery mechanisms may no longer work correctly in mobile environments. To illustrate the important aspects that need to be considered and provide a solution for these important yet “tricky” issues in this article, we focus on an important topic of data management in mobile computing, which is concerned with how to ensure serializability for mobile-client data caching. New solutions are needed in dealing with caching multimedia data for mobile clients, for example, a cooperative cache architecture was proposed in Lau, Kumar, and Vankatesh (2002). The particular aspect considered in this article is that when managing a large number of multimedia objects within mobile client-server computing environments, there may be multiple physical copies of the same data object in client caches with the server as the primary owner of all data objects. Invalid-access prevention policy protocols developed in traditional DBMS environment will not work correctly in the new environment, thus, have to be extended to ensure that the serializability involving data updates is achieved in mobile environments. The research by Parker and Chen (2004) performed the analysis, proposed three extended protocols, and conducted experimental studies under the invalid-access prevention policy in mobile environments to meet the serializability requirement in a mobile client/server environment that deals with multimedia objects. These three protocols, referred to as extended server-based two-phase locking (ES2PL), extended call back locking (ECBL), and extended optimistic twophase locking (EO2PL) protocols, have included additional attributes to ensure multimedia object serializability in mobile client/server computing environments. In this article, we examine this issue, present key ideas behind the solution, and discuss related issues in a broader context.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 194
Author(s):  
R Caroline Kalaiselvi ◽  
S Mary Vennila

The Internet of Things (IoT) prompts can administered by gathering data from little sensor gadgets. As of late, stockpiling less detecting gadgets have been utilized to actualize IoT administrations.  They rely upon conveyed programming from a system server to work benefit capacities and IoT administrations are in view of gathered client data. In this way, it is critical to keep up trusted associations aid programming conveyance or information transmission. In the event that a system association is deceitful, stable information transmission can't be accomplished. Dishonest information associations cause numerous issues in IoT administrations. In this manner, this paper proposes a product refresh strategy in trusted association of IoT organizing. The technique utilizes Low Power Wide Area Network (LPWAN) as long-go IoT organizing innovation and utilizations a portable edge cloud to enhance registering effectiveness in an entrance arrange that comprises of IoT gadgets with lacking assets. In the strategy, the versatile edge cloud is coordinated into a door, and forms detecting information and remote programming updates of LPWAN. IoT gadgets can get programming capacities from the versatile edge cloud. The proposed strategy investigates measurable data about associations in a get to arrange and decides the LPWAN put stock in associations. At that point, programming updates can be performed over the confided in association. Utilizing trusted associations prompts an expanded bundle conveyance rate and decreased transmission vitality utilization. The strategy is contrasted with at present accessible frameworks through PC recreation and through computer simulation and this method’s efficiency is validated. 


2020 ◽  
Vol 8 (3) ◽  
pp. 69-81
Author(s):  
Nitin Chawla ◽  
Deepak Kumar ◽  
Dinesh Kumar Sharma

Cloud computing is gradually increasing its popularity in enterprise-wide organizations. Information technology organizations e.g., IBM, Microsoft, and Amazon have already shifted towards Cloud computing. Cloud-based offerings such as Software as a Service, Platform as a Service and Infrastructure as a Service (IAAS) are the most famous offerings. Most of the existing enterprise applications are deployed using an on-premise model. Organizations are looking for Cloud based offerings to deploy or upgrade their existing applications. SAP, Microsoft Dynamics, and Oracle are the most famous ERP or CRM application OEMs. These enterprise applications generate lots of data are hosted in an organization or on client data centers. Moving data from one data center to the Cloud is always a challenging tasks which cost a lot and takes much effort. This study proposes an efficient approach to optimize cost for data migration in cloud computing. This study also proposes the approach to optimize cost for data collection from multiple locations which can be processed centrally and then migrate to Cloud Computing.


2019 ◽  
Author(s):  
Mazin Farouki ◽  
Jo McArdle ◽  
Andy Bromley ◽  
Shinya Sakamoto

Sign in / Sign up

Export Citation Format

Share Document