Archive for ‘Technology: Office Technology’
While Software-as-a-Service (SaaS) and cloud computing are all the rage these days, one of basic tenets of SaaS – the pay-as-you-go, subscription-based pricing model – seems to be catching on in the traditional desktop software world.
Last week Adobe made waves by announcing $35/month subscription pricing for its flagship Photoshop product, which has traditionally retailed for over $1,000. Another giant in the traditional software market, Microsoft, has long offered subscription-based pricing for Microsoft Office, but is now also looking to bring Office to a hosted subscription-based offering via Office 365.
This shift isn’t entirely surprising – subscription-based pricing offers . . . [more]
I’m just back from a great ABA TECHSHOW in Chicago last week. I learned lots about legal technology and enjoyed the company of fellow technology enthusiasts. Wish you all were there, but as I know many SLAW readers were not, in lieu I offer a great collection of articles from the just released 2011 Techshow Tips issue of Law Practice magazine:
Standards for on-premise, cloud and mobile technologies used by lawyers have, to-date, been lacking. While an abundance of recommendations, best practices and other guidelines have been issues by Bar Associations and other organizations, there has not been a single, comprehensive document lawyers could look to for clear guidance on what minimal standards should be adhered for on-premise, cloud and mobile technologies.
The International Legal Technology Standards Organization (ILTSO) aims to change that. ILTSO is a non-profit organization consisting of attorneys, bar association representatives, IT professionals, and business leaders with a stated mission of “helping attorneys and clients better understand the . . . [more]
The good folk over at 3 Geeks and a Law Blog have asked readers to contribute Your Favorite PowerPoint Story:
We had a lot of traffic, comments and feedback when Toby wrote his “Don’t Use PowerPoint” post last week. We thought we’d play off of that post to ask the readers to comment on some of their PowerPoint stories (we said they could be good or bad… but, we preferred bad) and share them with us for this week’s Elephant Post. I’ve used PowerPoint for many, many years, and it is a rare occasion that everything that worked on
. . . [more]
Technical work in the library–largely done behind-the-scenes–is key to ensuring things go smoothly on the client-facing side such as reference and research. One tedious and time-consuming tech task is shelf-reading: checking each book on the shelf to ensure it has been signed back in and is in the correct place. Without doing this on a regular basis (such as once or twice a year), books that have been mis-shelved become impossible to locate.
A library shelf-reading prototype using augmented reality technology–technology that adds to an image of physical space with a computer-generated overlay–is being developed out of Miami University’s Augmented . . . [more]
Since the IPad was introduced it has commonly been acknowledged that the IPad and its brethren are transitional devices, a stepping stone to the next transformation in computing. I believe that time has come a bit sooner than expected. Forget the IPad, the Blackberry, the Android, I want a Pomegranate! The question is not, what does it do? The question is what does it not do? Have a look for yourself: Pomegranate . . . [more]
Last week Twitter announced support for secure HTTP, or HTTPS, for its popular microblogging service. Twitter joins Facebook, who announced support for HTTPS earlier this year, and Google, who enabled default HTTPS access for Gmail over a year ago.
The ever-increasing support for HTTPS is a good thing for the web and its users, as it protects data from being snooped upon by hackers or other third parties. Plain, unencrypted HTTP is highly susceptible to eavesdropping attacks, especially if you are using a public Wi-Fi network. Everything transmitted over HTTP, whether the contents of an e-mail or a username/password . . . [more]
Boasting performance that is an order of magnitude faster than traditional Hard Disk Drives (HDDs), Solid State Drives (SSDs) are quickly becoming a must-have upgrade for desktops and laptops. While HDDs utilize spinning platters that encode data magnetically, SSDs make use of solid-state memory that stores data electronically, therefore eliminating all moving parts and magnetic sensitivity.
While SSDs offer vast performance improvements over traditional HDDs, they introduce new issues for users that would like to wipe data from their SSDs. As pointed out by a recent Ars Technica article, the usual protocol of “secure deleting” files by writing zeroes . . . [more]
Software developer Aji has just released a new version of iAnnotate with some feature upgrades that will please lawyers who’ve given up reading printouts of cases but crave an active electronic reading experience. Here’s Aji says about version 1.4:
Version 1.4 adds: Typewriter annotations, thickness and transparency for drawing annotations (including a “free-form” highlighter), and ability to view many other types of PDF annotations created in other tools. The ability to save web pages as vector (fully-searchable, highlightable) PDF files. The ability to import Word and PowerPoint files as vector PDF. Single-page mode option including swipe, slide, and tap to
. . . [more]
Google’s Gmail service is suffering an outage that has left 120,000 of its 150 million Gmail users without e-mail, contacts, labels and other content since the weekend. While some will no doubt use the incident as a basis to proclaim the cloud as unreliable, the truth of the matter is more complex. Both on-premise and cloud-based services can, potentially, suffer from data loss. With on-premise services, you (or your IT staff) are typically 100% responsible for backing up your data, securely storing it, and testing recovery procedures. All (or at least most) cloud-based services will take care of this for . . . [more]
Last Thursday, Ryerson University hosted a symposium entitled “Exploring the Future of E-mail, Privacy and Cloud Computing at Ryerson.” It was co-hosted by a Ryerson administrative committee and Ryerson’s Privacy and Cyber Crime Institute for the purpose of seeking input on Ryerson’s own plans to upgrade its e-mail and collaboration systems, including its open consideration of cloud based services. Ryerson was kind enough to open the event to individuals outside of its own community, and attracted a number of interested observers from other Ontario post-secondary educational institutions, many of which are also intrigued by the clear benefits of outsourcing to . . . [more]