90 Texas L. Rev. See Also 75
Professor Petherbridge focuses on the claim that a model, identified in Professor Chien’s article, can be used to predict whether a patent is likely to be asserted against an innovation. Using assumptions generous to the model, Professor Petherbridge generates a test that improves the probability of accurately assessing whether a patent will be litigated. He also identifies a number of practical problems with Professor Chien’s model, including that the model captures false positives that render implementation of the model burdensome. Professor Petherbridge next asks whether there is a “lurking variable” that can better explain the model’s results and whether the data generated by the model is practically useful. While Professor Petherbridge identifies these misgivings with Professor Chien’s article, he notes that the article has identified certain acquired characteristics that may make predicting patent litigation an easier task.
Diane H. Mazur
90 Texas L. Rev. See Also 145
Professor Diane H. Mazur adds context to Deborah N. Pearlstein’s analysis in The Soldier, the State, and the Separation of Power.
Peter M. Shane
90 Texas L. Rev. See Also 87
Professor Shane responds to the framework for cybersecurity protections developed in Mr. Thompson’s note. For reasons of practicality and comprehensiveness, Professor Shane argues that this framework is insufficient, and he identifies current issues that suggest larger problems that confront the cybersecurity enterprise. Professor Shane notes that the current cybersecurity climate is more serious than suggested by Mr. Thompson, with criminal enterprises becoming increasingly sophisticated and damaging to networks. This climate is also characterized by an absence of effective policy caused by overlapping bureaucracies, conflict between the military and private sectors, private control of networks, and a lack of governmental understanding of the problem.
Professor Shane concludes by identifying his proposal for a national commission to consider public needs and technical expertise in formulating an approach to cybersecurity.
James J. Brudney
90 Texas L. Rev. See Also 205
Professor Brudney responds to Widiss’s article on Congressional override of judicial statutory interpretation.
Robert C. Bird
90 Texas L. Rev. See Also 63
Professor Bird responds to Ms. Lindsey Mills’s Note, Moral Rights: Well-Intentioned Protection and its Unintended Consequences, applauding her reasoned criticisms of moral rights, particularly the right of integrity, but noting some misgivings based on her discussions of a Canadian moral rights case and artistic destruction. Professor Bird concludes with an appeal to pragmatism in light of “artistic doomsday rhetoric” against moral rights protections in American law.
Charles A. Sullivan
90 Texas L. Rev. See Also 157
Professor Charles A. Sullivan responds to Professor Widiss’s article on Congressional override of judicial interpretation of statutory law.
Alfred L. Brophy
90 Texas L. Rev. See Also 55
Professor Brophy responds to the ongoing dialogue concerning Professor Calabresi and Ms. Rickert’s article with his reactions to their originalist argument that the Fourteenth Amendment prohibits sex discrimination as a matter of original public meaning. He observes a tension between original meaning and original intent and argues that original public meaning may differ from the Framers’ “original expected applications.” Professor Brophy continues by asking a series of questions to ascertain how the Framers identified, how original meaning is established, and whose meaning governs. Professor Brophy then observes how the Reconstruction-era amendments were construed broadly at the time and how by the Civil War, Americans had viewed the Constitution as a set of broad principles rather than a “mere set of words.” Brophy concludes by suggesting potential applications of the Calabresi and Rickert argument.
Christopher R. Leslie
90 Texas L. Rev. See Also 171
Professor Christopher R. Leslie responds to Stephen Fraser’s argument that the Department of Justice should use antitrust amnesty as a model for the creation of FCPA self-reporting incentives.
Henry E. Hildebrand
90 Texas L. Rev. See Also 1
In this Response, Chapter 13 Trustee Henry Hildebrand addresses whether the results of Professor Katherine Porter’s study warrant the conclusion that Chapter 13 is merely a pretend solution. According to Hildebrand, the fact that debtors who failed to complete their Chapter 13 plans did not achieve the goals that they sought to accomplish when they filed for Chapter 13 is not evidence of the systemic failure of either Chapter 13 or the consumer bankruptcy system. Hildebrand argues that Porter’s study is too myopic, focusing only on the experiences of “failed” Chapter 13 debtors while ignoring the positive results that Chapter 13 has achieved for debtors who were able to complete their plans. He also posits alternative explanations for Porter’s results, including the tendency of overconfident debtors to draft unrealistic repayment plans and the failure of Chapter 13 debtors to seeks post-confirmation judicial modification of their plans. Although he acknowledges that Porter raises valid points about the complexity of the Chapter 13 system and participants’ unrealistic expectations of future financial stability, he argues that these issues apply equally to Chapter 7 debtors and concludes that, absent more probative evidence of systemic failure, they are better solved by providing debtors with increased judicial oversight and legal assistance than by conversion to a single-chapter bankruptcy system.
Robert W. Tarun & Peter P. Tomczak
90 Texas L. Rev. See Also 183
Messrs. Tarun and Tomczak respond to Stephen Fraser’s argument that the Department of Justice should use antitrust amnesty as a model for the creation of FCPA self-reporting incentives.