765 resultados para big law firms
Resumo:
Law is saturated with stories. People tell their stories to lawyers; lawyers tell their client's stories to courts; and legislators develop regulation to respond to their constituent's stories of injustice or inequality. My approach to first-year legal education respects this narrative tradition. Both my curriculum design and assessment scheme in the compulsory first-year subject Australian Legal System deploy narrative methodology as the central teaching and learning device. Throughout the course, students work on resolving the problems of four hypothetical clients. Like a murder mystery, pieces of the puzzle come together as students learn more about legal institutions and the texts they produce, the process of legal research, the analysis and interpretation of primary legal sources, the steps in legal problem-solving, the genre conventions of legal writing style, the practical skills and ethical dimensions of professional practice, and critical inquiry into the normative underpinnings and impacts of the law. The assessment scheme mirrors this design. In their portfolio-based assignment, for example, students devise their own client profile, research the client's legal position and prepare a memorandum of advice.
Resumo:
Big Datasets are endemic, but they are often notoriously difficult to analyse because of their size, heterogeneity, history and quality. The purpose of this paper is to open a discourse on the use of modern experimental design methods to analyse Big Data in order to answer particular questions of interest. By appealing to a range of examples, it is suggested that this perspective on Big Data modelling and analysis has wide generality and advantageous inferential and computational properties. In particular, the principled experimental design approach is shown to provide a flexible framework for analysis that, for certain classes of objectives and utility functions, delivers near equivalent answers compared with analyses of the full dataset under a controlled error rate. It can also provide a formalised method for iterative parameter estimation, model checking, identification of data gaps and evaluation of data quality. Finally, it has the potential to add value to other Big Data sampling algorithms, in particular divide-and-conquer strategies, by determining efficient sub-samples.
Resumo:
Increasingly larger scale applications are generating an unprecedented amount of data. However, the increasing gap between computation and I/O capacity on High End Computing machines makes a severe bottleneck for data analysis. Instead of moving data from its source to the output storage, in-situ analytics processes output data while simulations are running. However, in-situ data analysis incurs much more computing resource contentions with simulations. Such contentions severely damage the performance of simulation on HPE. Since different data processing strategies have different impact on performance and cost, there is a consequent need for flexibility in the location of data analytics. In this paper, we explore and analyze several potential data-analytics placement strategies along the I/O path. To find out the best strategy to reduce data movement in given situation, we propose a flexible data analytics (FlexAnalytics) framework in this paper. Based on this framework, a FlexAnalytics prototype system is developed for analytics placement. FlexAnalytics system enhances the scalability and flexibility of current I/O stack on HEC platforms and is useful for data pre-processing, runtime data analysis and visualization, as well as for large-scale data transfer. Two use cases – scientific data compression and remote visualization – have been applied in the study to verify the performance of FlexAnalytics. Experimental results demonstrate that FlexAnalytics framework increases data transition bandwidth and improves the application end-to-end transfer performance.
Resumo:
Network topology and routing are two important factors in determining the communication costs of big data applications at large scale. As for a given Cluster, Cloud, or Grid system, the network topology is fixed and static or dynamic routing protocols are preinstalled to direct the network traffic. Users cannot change them once the system is deployed. Hence, it is hard for application developers to identify the optimal network topology and routing algorithm for their applications with distinct communication patterns. In this study, we design a CCG virtual system (CCGVS), which first uses container-based virtualization to allow users to create a farm of lightweight virtual machines on a single host. Then, it uses software-defined networking (SDN) technique to control the network traffic among these virtual machines. Users can change the network topology and control the network traffic programmingly, thereby enabling application developers to evaluate their applications on the same system with different network topologies and routing algorithms. The preliminary experimental results through both synthetic big data programs and NPB benchmarks have shown that CCGVS can represent application performance variations caused by network topology and routing algorithm.
Resumo:
A holistic consideration of innovation and associated activities is still very new to consulting engineering firms. This research will have benefits for both industry and academia. The final outcome of this research is a prioritised decision making innovation model that can be used by consulting engineering firms to make informed decisions by investing in appropriate innovation activities that positively impact project performance. This helps by using an informed approach towards investing rather than 'hit-and-miss' trialling.
Resumo:
Advances in the field of Assisted Reproductive Technology (ART) have been revolutionary. This book focuses on the use of ARTs in the context of families who seek to conceive a matching sibling donor as a source of tissue to treat an existing sick child. Such children have been referred to as ‘saviour siblings’. Considering the legal and regulatory frameworks that impact on the accessibility of this technology in Australia and the UK, the work analyses the ethical and moral issues that arise from the use of the technology for this specific purpose. The author claims the only justification for limiting a family’s reproductive liberty in this context is where the exercise of reproductive decision-making results in harm to others. It is argued that the harm principle is the underlying feature of legislative action in Western democratic society, and as such, this principle provides the grounds upon which a strong and persuasive argument is made for a less-restrictive regulatory approach in the context of ‘saviour siblings’.
Resumo:
Australian Media Law details and explains the complex case law, legislation and regulations governing media practice in areas as diverse as journalism, advertising, multimedia and broadcasting. It examines the issues affecting traditional forms of media such as television, radio, film and newspapers as well as for recent forms such as the internet, online forums and digital technology, in a clear and accessible format. New additions to the fifth edition include: - the implications of new anti-terrorism legislation for journalists; - developments in privacy law, including Law Reform recommendations for a statutory cause of action to protect personal privacy in Australia and the expanding privacy jurisprudence in the United Kingdom and New Zealand; - liability for defamation of internet search engines and service providers; - the High Court decision in Roadshow v iiNet and the position of internet service providers in relation to copyright infringement via their services; - new suppression order regimes; - statutory reforms providing journalists with a rebuttable presumption of non-disclosure when called upon to reveal their sources in a court of law; - recent developments regarding whether journalists can use electronic devices to collect and disseminate information about court proceedings; - contempt committed by jurors via social media; and an examination of recent decisions on defamation, confidentiality, vilification, copyright and contempt.
Resumo:
Big Data and predictive analytics have received significant attention from the media and academic literature throughout the past few years, and it is likely that these emerging technologies will materially impact the mining sector. This short communication argues, however, that these technological forces will probably unfold differently in the mining industry than they have in many other sectors because of significant differences in the marginal cost of data capture and storage. To this end, we offer a brief overview of what Big Data and predictive analytics are, and explain how they are bringing about changes in a broad range of sectors. We discuss the “N=all” approach to data collection being promoted by many consultants and technology vendors in the marketplace but, by considering the economic and technical realities of data acquisition and storage, we then explain why a “n « all” data collection strategy probably makes more sense for the mining sector. Finally, towards shaping the industry’s policies with regards to technology-related investments in this area, we conclude by putting forward a conceptual model for leveraging Big Data tools and analytical techniques that is a more appropriate fit for the mining sector.
Resumo:
This chapter considers the role of the law in communicating patient safety. Downie, Lahey, Ford, et al’s (2006) preventing, knowing and responding theoretical framework is adopted to classify the different elements of patient safety law. Rather than setting out all relevant patient safety laws in detail, this chapter highlights key legal strategies which are employed to: prevent the occurrence of patient safety incidents (preventing); support the discovery and open discussion of patient safety incidents when they do occur (knowing),; and guide responses after they occur (responding) (Downie, Lahey, Ford, et al 2006). The law is increasingly being invoked to facilitate open discussion of and communication surrounding patient safety. After highlighting some legal strategies used to communicate patient safety, two practice examples are presented. The practice examples highlight different aspects of patient safety law and are indicative of communication issues commonly faced in practice. The first practice example focuses on the role of the Ccoroner in communicating patient safety. This example highlights the investigative role of the law in relation to patient safety (knowing). It also showcases the preventing responding and preventing elements in respect of the significant number of communication errors that can occur in a multi-disciplinary, networked health system. The main focus of the second practice example is responding example illustrates how the law responds to health service providers’ and professionals’ miscommunication (and subsequent incidents) during treatment, however it also touches upon knowing and preventing.
Resumo:
Remedying the mischief of phoenix activity is of practical importance. The benefits include continued confidence in our economy, law that inspires best practice among directors, and law that is articulated in a manner such that penalties act as a sufficient deterrent and the regulatory system is able to detect offenders and bring them to account. Any further reforms must accommodate and tolerate legal phoenix activity. Phoenix activity pushes tolerance of entrepreneurial activity to its absolute limits. The wisest approach would be to front end the reforms so as to alleviate the considerable detection and enforcement burden upon regulatory bodies. There is little doubt that breach of the existing law is difficult and expensive to detect; and this is a significant burden when regulators have shrinking budgets and are rapidly losing feet on the ground. This front end approach may need to include restrictions on access to limited liability. The more limited liability is misused, the stronger the argument to limit access to limited liability. This paper proposes that such an approach is a legitimate next step for a robust and mature capitalist economy.
Resumo:
"This important book translates seven landmark essays by one of Japan’s most respected and influential legal thinkers. While Takao Tanase concedes that law might not matter as much in Japan as it does in the United States, in a provocative challenge to socio-legal researchers and comparative lawyers, he asks: why should it? The issue, he contends, is not whether law matters to society; it is how society matters to law."--Publisher website
Resumo:
A common theme in many accounts of road safety and road use in low and middle income countries is a widespread lack of compliance with traffic laws and related legislation. A key element of the success of road crash prevention strategies in high income countries has been the achievement of safer road user behaviour through compliance with traffic laws. Deterrence-based approaches such as speed cameras and random breath testing, which rely on drivers making an assessment that they are likely to be caught if they offend, have been very effective in this regard. However, the long term success of (for example) drink driving legislation has been supported by drivers adopting a moral approach to compliance rather than relying solely on the intensity of police operations. For low and middle income countries such morally based compliance is important, since levels of police resourcing are typically much lower than in Western countries. In the absence of morally based compliance, it is arguable that the patterns of behaviours observed in low and middle income countries can be described as "pragmatic driving": compliance only when there is a high chance of being detected and fined, or where a crash might occur. The potential characteristics of pragmatic driving in the macro-, meso- and micro-context of driving and the enforcement approach that could address it are outlined, with reference to the limited existing information available.