Canada’s online legal magazine.

Archive for ‘Technology’

Tomorrow’s Textbooks – Coming Sooner

Simon has mentioned the challenges of writing for the screen, and the prospects for tomorrow’s texts.

An announcement from Macmillan describes an ambitious model for moving popular student texts to a web platform with the ability to have dynamic linking and enriched content. Textbooks will no longer be flat. The new service is called Dynamicbooks.

So far, the texts chosen appear to be in the hard sciences, where presumably knowledge is more stable than it is in the human sciences, and is universal. No sign of anything similar on the legal front, where markets are much more fragmented . . . [more]

Posted in: Legal Information, Legal Information: Publishing, Miscellaneous, Technology

Data Preservation Order Applied to Unallocated Space

In the first of a two-part comment on Law.com’s Law Technology News, Leonard Deutchman discusses the recent case of TR Investors LLC v. Genger No. 3994-VCS, Delaware Court of Chancery (Dec. 9, 2009) [PDF]. Somewhat oversimplifying matters, the relevant facts were that during the course of litigation between Genger and TR Investors (the Trump Group), there was a stipulated status quo order that provided, in part:

. . . the plaintiffs and the defendants, and their respective officers, directors, agents, [etc.] . . . are hereby restrained and enjoined from, directly or indirectly . . . tampering with, destroying

. . . [more]
Posted in: Substantive Law, Technology

Don’t Give Away Your Key…

♫ Don’t go breaking my heart
You take the weight off me
Honey when you knock on my door
I gave you my key…♫

Lyrics and music by Sir Elton John and Bernie Taupin, recorded by Sir Elton John and Kiki Dee.

There is a disturbing post today to the IT Blog entitled: Computer Breaking and Entering is a Business.

Aside from the statement that 80% of the PC hack attacks come about thru vulnerabilities in Adobe Acrobat’s Reader (based on a report from ScanSafe, a Cisco company), the acknowledgment that there is an elephant in the room . . . [more]

Posted in: Practice of Law, Practice of Law: Practice Management, Technology

IBM’s CoScripter Reusable History

This one comes under the conflicted heading of “fairly nifty / kind of creepy.” IBM’s Research Labs have come up with a Firefox plugin called CoScripter Reusable History that records every single click and entry you make in the browser — and then lets you search, replay, and share that history, hence the “reusable.” This graphic (click to enlarge) will give you a quick sense of what’s on offer here. (There’s also a video and a further explanation here, that should clear up any confusion.)

I can see some uses for this — and, of course, some dangers for . . . [more]

Posted in: Technology

A Few Challenges for Reed Elsevier

London’s business press is reporting on the challenging results that Reed Elsevier posted for 2009 and the strategies that the new CEO Erik Engstrom will have to consider to turn the company around. Erik Engstrom is the third CEO within the last twelve months (To lose one CEO is a misfortune; to lose two seems like carelessness).

Reed reported a 36 per cent fall in pre-tax profits to £487 million, and flat revenues for 2009. It expected the first half of 2010 to remain challenging and described last year’s performance as “relatively robust given the depth of the global recession”. . . . [more]

Posted in: Legal Information, Legal Information: Libraries & Research, Legal Information: Publishing, Technology

Identifying Lawyers — and Others

Stephen Mason and Nicholas Bohm have an interesting article, “Identity and its verification”, published in Computer Law & Security Review, Volume 26, Number 1, January 2010, 43 – 51. (Professor Stephen Mason has written a book on electronic signatures and runs a journal on similar topics. Nicholas Bohm is a security expert.)

It’s available on Science Direct [PDF] and also . . . [more]

Posted in: Administration of Slaw, Technology, ulc_ecomm_list

Translating a Legal Document With Goggles

A post today from Andrew Gomez on the Google Blog:

Imagine being in a foreign country staring at a restaurant menu you can’t understand, a waiter impatiently tapping his foot at your tableside. You, a vegetarian, have no idea whether you’re about to order spaghetti with meatballs or veggie pesto. What would you do? Well, eventually you might be able to take out your mobile phone, snap a photo with Google Goggles, and instantly view that menu translated into your language. Of course, that’s not possible today — but yesterday at the Mobile World Congress we demonstrated a

. . . [more]
Posted in: Education & Training, Legal Information, Substantive Law, Technology: Internet

Comprehensive Database of Organizational Social Media Policies

Mike Kujawski recently posted an item to the Public Sector Marketing 2.0 LinkedIn Group about an online database containing links to the social media policies of dozens of organizations around the world.

If your library, law firm, agency or organization is thinking of creating policies and guidelines for the use of blogs, wikis, or social networking sites such as Twitter or Facebook, this is a good place to look for guidance and examples.

Kujawski publishes the Public Sector Marketing 2.0 blog. . . . [more]

Posted in: Technology, Technology: Internet

Windows Phone 7 – “Microsoft Has Out-Appled Apple”

Microsoft unveiled its much anticipated Windows Phone 7 operating system this week at the Mobile World congress in Barcelona. It is not based on the existing 6.X OS – but is entirely new – based on the Zune.

The reaction by the tech press has been very positive. For example, Gizmodo says that “Microsoft has out-appled Apple” , and “I’m sorry, Cupertino, but Microsoft has nailed it. Windows Phone 7 feels like an iPhone from the future. The UI has the simplicity and elegance of Apple’s industrial design, while the iPhone’s UI still feels like a colorized Palm Pilot.”

For . . . [more]

Posted in: Technology

How Secure Are Your Passwords?

The two things everyone using computers is supposed to do are: back up regularly and create difficult, changing passwords. The two things that nearly everyone using computers fails to do are: back up regularly and create difficult, changing passwords. Now, the business about backing up wouldn’t apply to computers used in law offices (would it?). But it’s not so clear that all firms and lawyers in those firms have got a good password policy in place.

We’ve talked about this on Slaw a couple of times recently. John Gregory asked whether a failure to set proper — i.e. complex — . . . [more]

Posted in: Practice of Law, Practice of Law: Practice Management, Technology

Google Buzz Already Raising Privacy Concerns

Simon Fodden first spoke about the new Google Buzz here on Slaw last week. He didn’t have access yet at the time (do you now, Simon?).

First impressions

I was surprised to see it appear unannounced in my Gmail box a few days ago as an option on the left side of my mailbox. When I clicked on it, I was even more surprised to see I had followers and people I followed already set up (those people I was connected with who also have Gmail accounts). I was already privy to a number of conversations in progress. My . . . [more]

Posted in: Legal Information, Substantive Law, Technology, Technology: Internet

3li_EnFr_Wordmark_W

This project has been made possible in part by the Government of Canada | Ce projet a été rendu possible en partie grâce au gouvernement du Canada