We all covet the latest and greatest of technology, not to mention possessing the fastest computer. One way to increase the speed of your computer is to use a solid state drive (SSD) instead of a mechanical one. Essentially, SSDs are flash memory devices that appear as a hard disk to the computer. It is very fast to write and read from memory as opposed to accessing data from the rotating platters of a mechanical disk drive. Solid state drives are three to four times faster than their mechanical counterparts when writing or reading large files. Sound good? Then you’ll . . . [more]
Archive for the ‘Legal Technology’ Columns
In my previous posting, Automation in the Legal Market, I discussed the issue of automation vs. augmentation, where I touched upon the issue of the potential changes that might flow from the entry of IBM Watson into the legal sphere with the ROSS search engine. While the issue of automation is one that has been discussed from time to time over the last few years, there has been an explosion of articles in the last while that have addressed the automation and artificial intelligence (AI) robots, either directly or tangentially.
The Internet of Things involves the connection of many things to the Internet that did not use to be networked. The numbers of such interconnected things is growing rapidly; the estimates vary greatly but are always counted in the billions over the next few years. The interconnection allows those things to communicate with the world, and vice versa. We have considered some of the legal issues raised by such communications, whether with the ‘world’ intended by the designer of the interconnection or with someone with unforeseen capacity or intention.
This column focuses on one communication: an ‘off’ switch, used by . . . [more]
Ten years ago Marc Lauritsen spoke at one of our conferences on the future of law. He projected ahead to 2015, and threw in a prediction as to who would be the US President. While the name was unknown to the Australian audience, the absurdity of his suggestion was highlighted by a supporting photo. Yes, the world was changing, but not THAT much, that soon.
Anything that Marc says has my instant attention. His development of choice boxing is a concept that definitely warrants serious exploration. This is a pioneering decision-support tool that results from 30 years of insight. Marc . . . [more]
Lawyers need to find information, the faster the better. As the years go by, your electronic files expand and your ability to retrieve information quickly can suffer. I’ve already looked at desktop search by itself and want to look at search that incorporates your e-mail this time around. A search tool that digs into your inbox and, potentially, everything else on your computer, can eliminate the need to repeat searches in more than one place.
Search Your Email
Tom Davenport is, among other things, a distinguished professor at Babson College, a research fellow at the MIT Center for Digital Business, and director of research at the International Institute for Analytics. He is recognized as one of the pioneers in the field of knowledge management (KM). In 2000 he co-authored, along with Larry Prusack, one of the early books in the field of KM, Working Knowledge: How Organizations Manage What They Know. He is acknowledged as one of the most trusted consultants and the third leading business-strategy analyst (just behind Peter Drucker and Tom Friedman) by Optimize Magazine . . . [more]
Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were based on the American Bar Association’s modifications to the Comments of Rule 1.1 respecting Competence (“…a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with technology…”) and Rule 1.6 respecting Confidentiality (“(c) A lawyer shall make reasonable efforts to prevent the unintended disclosure of, or unauthorized access to, information relating to the representation of a client.”)
What’s reasonable? The Comments go on to list relevant factors:
- the sensitivity of
When the Uniform Law Conference of Canada decided, back in 1993, to address the legal effect of electronic communications, it started with the law of evidence. See 1993 Proceedings of the Uniform Law Conference of Canada, Appendix G, pages 34-35, 198 – 206. It was clear even then that more and more information intended to have legal consequences was generated, communicated and stored by electronic means. If the legal consequences were to be properly adjudicated, the information had to be capable of being put before the adjudicators.
The question was thought to be of interest both to barristers, who . . . [more]
As I put together another Sinch Online Legal Services Conference to be held in May in Sydney, I reflect on how much things have changed with respect to IT and Law in just the last 12 months. Similiarly, a visit to an Apple Store also has an affect on me, but there is uncertainty as to which is greater: amazement at what is possible, and affordable, today; or the fact that there was so much opposition to the “bleedingly obvious” by so many, for so long.
The feeling that one lives in the age of the most rapid technological development . . . [more]
Social media is a coursing flow of data and information. Twitter’s own output is known as the firehose for obvious reasons. You can tap into that volume to monitor an event or person, making the flow more manageable. To do so, you need to understand what you are looking for and how to avoid missing it.
There are some basic ways to follow a topic on Twitter. The most common is the hashtag – placing a pound sign # in front of a term – and Twitter converts those into a clickable link. Hashtags have a few drawbacks. First, everyone . . . [more]
Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint sensor. There have been some elaborate (and expensive) methods from using 3-D printing to using Gummi Bears and everything in between. Back in September of 2013, German hacker Starbug successfully proved that bypassing Touch ID was “no challenge at all,” according to Ars Technica. As Starbug mentioned in the interview, it took him nearly 30 hours from unpacking the iPhone to developing the hack to reliably bypass the fingerprint security.
At the recent 31C3 conference, the folks from Chaos . . . [more]
Among his many other activities – including practising law – Robert Ambrogi has been writing a blog on legal technology issues, LawSites, since 2002. His posts are always interesting and often very informative. His posting at the end of last year, entitled The 10 Most Important Legal Technology Developments of 2014, particularly caught my attention.
Several developments, such as those relating to legal research, legal hacking, encryption, and searching court dockets, are outside my particular area of interest, knowledge management. Three, however, were of particular interest to me:
- Businesses and technology are changing the nature of law practice