Review of the iPad in One Hour for Litigators
We have long been fans of Tom Mighell’s iPad books, which include iPad in One Hour for Lawyers, iPad Apps in One Hour for Lawyers, and now the third member of the series, iPad in One Hour for...
View ArticleMetadata in Digital Photos – Should You Care?
We are hopeful that you are familiar with metadata, especially as it exists in e-mail messages and word processing files. If not, then a brief refresher is in order. There are a couple of different...
View ArticleState Court Judges’ Perspective on E-Discovery
We recently had the pleasure of serving on a Fairfax Bar Association CLE faculty which included Circuit Court Chief Judge Dennis Smith, and Circuit Court Judges John Tran and Jane Roush. Their panel...
View ArticleWill XP Be Attacked in April 2014?
Unless you’ve been hibernating, you know that support for Windows XP SP3 will end on April 8, 2014. This means that Microsoft will not be providing any security updates after that date. Should you care...
View ArticleA Scary “Mask”: Tag, You’re It!
Remember the childhood game of chasing all of your friends in an attempt to merely lay a finger on them so they could assume the role of the “it” person? It doesn’t feel much different these days when...
View ArticleSearch Engine Optimization: What Really Works for Law Firms?
Boy oh boy, is this a hotly debated topic – and we happened to attend a very illuminating presentation by Mark Jacobsen, the Senior Director of Strategic Development and Thought Leadership for FindLaw...
View ArticleThe T-Shaped Lawyer: Does the “T” Stand for Technology?
You’ve probably heard about the T-shaped lawyer. The origin of the term was the “T-shaped person” – a reference which first appeared in a 1991 London newspaper article on the subject of computing jobs....
View ArticleFinally, a Tablet That Can Replace a Laptop!
Finally, a tablet that can replace a laptop. Much as lawyers love their iPads – and they are great for surfing, e-mailing and presenting evidence in court – they are not true laptop replacements when...
View ArticleEncryption: Its Time Has Come
Lawyers tend to cringe when they hear the word “encryption.” To most lawyers, encryption is a dark art, full of mathematical jargon and incomprehensible to the average human being. When South Carolina...
View ArticleIt’s Easy to Bypass Smartphone Fingerprint Security
Ever since Apple delivered an iPhone with Touch ID there have been all kinds of ways to defeat the fingerprint sensor. There have been some elaborate (and expensive) methods from using 3-D printing to...
View ArticleWhy Do Lawyers Resist Ethical Rules Requiring Competence With Technology?
Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were based on the American Bar Association’s modifications to the Comments of...
View ArticleEconomical Solid State Drives Are Here
We all covet the latest and greatest of technology, not to mention possessing the fastest computer. One way to increase the speed of your computer is to use a solid state drive (SSD) instead of a...
View ArticleTwelve Tips for Effective Tech Presentations
Let’s face it – whether you are talking about securing your data or describing the functions of legal IT products, the average lawyer audience may regard your presentation as useful, but hardly as...
View ArticleAshley Madison and the Deep (And Sometimes Dark) Web
There are lawyers – mostly family and criminal defense lawyers – who know at least a little about the Deep Web and the Dark Web. But the average lawyer? Not so much. In fact, after the Ashley Madison...
View ArticleIs LinkedIn All It Was Cracked Up to Be?
Our friend and colleague Bob Ambrogi thinks LinkedIn is losing its luster – and we agree. He wrote a blog post recently on this subject. So we tip our hat to Bob before we begin. Author Simek isn’t...
View ArticleRecent Egregious Data Breaches: How They Happened
We should be grateful for other peoples’ data breaches – they help us to improve our own security. In our breach-a-day world, we seem to have more data breaches than ever. They come fast and furious –...
View ArticleLocky: The New Ransomware – and the Three Principles of Fighting Ransomware
According to Security Magazine, the number of ransomware attacks is predicted to increase in 2016. For the second quarter of 2015, more than 4 million samples of ransomware infections were identified...
View ArticleIs Windows 10 Spying on You?
It’s hard to find statistics identifying how many people are currently running Windows 10. One thing we do know is that there were 14 million downloads within 24 hours of the release. Some estimates...
View ArticleWhy Do Lawyers Resist Ethical Rules Requiring Competence With Technology?
Recently, the Virginia State Bar Council voted to adopt changes to the Model Rules of Professional Conduct. The changes were based on the American Bar Association’s modifications to the Comments of...
View ArticleFinding and Effectively Using an Expert Witness
In the summer of 2016, author Simek had the pleasure of joining a Pennsylvania Bar Association panel comprised of both testifying experts and judges to explore how to find and effectively use a good...
View Article