Handshake Software, a provider of SharePoint-based products and services to the legal market, announced its tech integration Ravel Law, a legal search, analytics, and visualization platform. The move is based on the need to provide a legal search product to law firms that will allow them to be more efficient in their practice.

Glenn LaForce, vice president of global sales & marketing at Handshake Software stated, ““Attorneys are under tremendous pressure from their clients with regards to the billable hour, so bringing together as many data sources as possible into one universal search is paramount for their practice,” he said. “To be able to perform legal research while seeing key financials, internal documents, contacts and internal expertise helps the attorneys become more efficient and effective.

This move is a strategic integration between the two companies products. By combining these technologies, the users Sharepoint experience will include search that allows for all knowledge to be in one place. LaForce confirms this by saying, “Lawyers, CIOs and knowledge management professionals tell us they want one system to deliver one-stop [knowledge management] information to their users. Our integration with Ravel Law is another important aspect of the Handshake Software’s all-encompassing solution that includes integration to online legal research and other major legal applications.”

The goal is to provide and environment where users will have access to critical firm data as well as online law research materials. This allows attorneys to more effectively manage the business and practice of law. We’re excited to bring these technologies to lawyers in one easy-to-find location,” said Nik Reed, co-founder and chief operating officer at Ravel Law.

 

Article via LegalTechNews, 12 January 2016

Photo:Assignments by Ryan Hyde [Creative Commons Attribution-NonCommercial-NoDerivs]

A new Federal Communications Commission report states that around 10 percent of Americans have no access to broadband, translating to around 34 million people without the ability to use high-speed Internet. The FCC defines “broadband” as Internet service that facilitates download speeds of 25 Mbps and upload speeds of 3 Mbps.

This year’s definition is controversial because of its new, higher standards. Last year the FCC classified broadband as Internet that enabled 10 Mbps for downloads and 1 Mbps for uploads. Critics argue that the FCC will create stricter requirements for Internet providers, who have already released statements saying that the new report on American access to high-speed Internet “lacks credibility.”

The United States Telecom Association, a trade group that represents telecommunications-based organizations in the U.S., states that the FCC is using the report as an excuse to extend its influence on Internet providers. “This annual process has become a cynical exercise, one that… is patently intended to reach a predetermined conclusion that will justify a continuing expansion of the agency’s own regulatory reach,” said US Telecom on Friday.

However, the FCC’s role is not limited to the chastisement of big-business Internet providers. The government will be taking several actions to increase access to high-speed Internet throughout the country, including the reformation of a low-income telephone subsidy program and the allocation of millions of federal dollars to Internet providers’ construction projects.

“Advanced telecommunications capability is not being deployed in a reasonable and timely fashion to all Americans,” stated an FCC factsheet.

Article via The Washington Post, 8 January 2016

Photo via country road by Remko Tanis

President Obama is ordering the federal government to study smart gun technology.

On Monday, Obama told the departments of Defense, Justice and Homeland Security to look into smart gun technology, such as fingerprint and radio-frequency identification. The goals are to track lost or stolen guns and to prevent accidental gunfire. The president cited a 2013 Department of Justice report as inspiration for the studying smart gun technology. Obama was quoted saying that “…the (DOJ) made clear that technological advancement in this area could help reduce accidental deaths and the use of stolen guns in criminal activities…”

These actions and others were addressed in a speech from the White House on Tuesday by the President. Obama outlined this memo and other executive actions meant to tackle gun violence. This speech comes one month after 14 people in San Bernardino, California were fatally shot by a couple influenced by radical islamic beliefs. In response, gun sales rose sharply amid fear of extremists.

In addition to encouraging gun safety, these executive actions will expand background checks in order to  close the “gun show loophole”. This loophole allows gun dealers conducting business at gun shows or online to do so without conducting background checks. Current laws exempts gun collectors and hobbyists from conducting background checks before selling a firearm.

Although The President’s recommendations are consistent with the Second Amendment and supported by the “overwhelming majority of the American people, including gun owners”, it is unlikely to find support among gun rights groups. These groups have stated that smart technology is a way for the federal government to track gun owners.

Chris Cox, executive director of the National Rifle Association’s Institute for Legislative Action, said in a statement Tuesday that the NRA would not allow “law-abiding gun owners to become scapegoats for President Obama’s failed policies…The NRA will continue to fight to protect the fundamental, individual right to keep and bear arms as guaranteed under our Constitution.”

Obama plans to address gun violence during a nationally televised town hall meeting at George Mason University in Virginia on Thursday night. In his speech Tuesday, he recalled the 2012 shooting at Sandy Hook Elementary School in Connecticut that left 20 children and six teachers dead. Obama stated, “Every time I think about those kids, it gets me mad”.

In his memo, he continues with that sentiment stating that “…developing and promoting technology that would help prevent these tragedies is an urgent priority…”

Article via CNET, 6 January 2016

Photo: 44 by SAL [Creative Commons Attribution-NonCommercial-NoDerivs]

In between Dec 20 and Jan 3, Apple said that customers purchased about $1.1 billion worth of app and in-app purchases which is a new record. Last year, Apple made about half a billion dollars in revenue. In 2015, customer spent a total of $20 billion on app purchases like Minecraft, Trivia Crack, as well as social networks such as Facebook Messenger and Snapchat. All in all, gaming and subscription apps did the best, like Clash of Clans and Hulu.

Not only has it been creating revenue, Apple has definitely seen growth in jobs. According to the new Progressive Policy Institute Report by Michael Mandel, Apple said it created 1.9 million jobs in the U.S., including 1.4 million through the App Store for developers, entrepreneurs, and some non-IT staff.

The App Store has consistently been the selling point for Apple products. This is a ray of hope because iPhone sales- the largest source of company profits- are expected to drop. Analysts do see revenue decreasing for 2016. Steve Koenig, a Consumer Technology Association market researcher, said that a number of factors, including a strong dollar and weak economies in parts of the world that had been driving new tech spending, indicate that 2016 will be a slower year for global tech spending overall.

The App Store will still continue to provide Apple with a distinguishable selling point because it helps keep customers coming back and gets them to buy more Apple products. Even more, Apple just launched a version of the App store for the Apple TV, expanding its presence to the family room.

Article via Washington Post, January 6, 2016

Photo: Apple. Tree. via Stuart Maxwell [Creative Commons Attribution-NonCommercial-NoDerivs]

Google has been famously testing out their version of a driverless car. The company wants to transform transportation by taking the driver out of the equation.

Driverless cars will be able to shuttle people from place to place while reducing the human error that is often the catalyst for road accidents.The California Department of Motor Vehicles recently made a proposal of rules for driverless cars. These new rules were presented for public commentary in mid December of 2015. The DMV wants to involve the public and will be hosting two workshops early in 2016, one in Sacramento and the other in Los Angeles.This proposal draft is the next step in allowing driverless cars on California roads. But Google is unhappy about one of the provisions.

The regulators are calling for the manufacturers of driverless cars to meet several safety and performance standards. These include things such as protecting the privacy of operators from the needless collection of user data and having a third party independently access performance. The rules also call for a licensed human driver, capable of taking over the steering wheel and pedals in the event of an emergency. The problem is that Google’s prototype for a driverless car does not have a steering wheel or pedals.

Google’s maintains that it wants to improve safety by equipping the car itself with protocols that surpass what a human could detect. For instance their cars have sensors that detect objects as far as two football fields away–in all directions. The state of California is looking at the broader aspect of autonomous cars, and remains more conservative on the issue. They  have warned Google in the past to add steering wheels and pedals. California legislators pushed The DMV to require that driverless cars contain wheels and people to steer them whenever they’re operated on public roads.

Google is disappointed that California legislators are limiting the potential of fully autonomous vehicles, the company said. Although the company is still in the prototyping phase where changes can easily be made, it is still a setback.

 

Article via TechNewsWorld, 18th December 2015

Photo:Auto che guidano da sole. Forse non le vedremo mai sulle nostre strade by Automobile Italia [Creative Commons Attribution-NonCommercial-NoDerivs]

Internet security is an important topic to address for anyone who surfs the web. Many of us want to be sure that our private data is being handled securely. The most popular way to protect our data online is through encryption. Encryption of data simply means that the information is encoded so that it can only be read by a key used to decode it. It sounds like super spy stuff, and in a way it is (that is a German enigma machine pictured above). In this article, we will discuss some of the ways that encryption is used to protect our data on the internet.

Computer encryption is based on cryptography, the practice and study of techniques to secure information. If you have ever heard of the Caesar cipher, that is a form of encryption. In our modern era, computers are generating complex algorithms that are used as the ciphers that crack the code.

There are two main modes of encryption: symmetric key and public key.

Symmetric key encryption

Caesar_Cipher
Caesar Cipher by prize Lerthirunvibul

The Caesar cipher is a great example of this. A letter is written to a friend, but all the words are spelled out by rotating the letter in the alphabet 4 spaces. This makes the letter nonsensical to anyone who intercepts it. But the friend it was written to knows the code (shift 4 spaces) and can therefore decode the letter.

The same happens in computing. Each computer has a secret code. The is a packet of information that is transported between the two computers. Once the transfer is complete the second computer decodes the encrypted packet.

Examples of this type of encryption: Hard drives, Private networks

 

Public key encryption

public key encryption
PublicKeyEncryption by Kalani Hausman

Sometimes this is called asymmetric key encryption. The main difference here is that each party does not have the same code to encrypt the message. Instead this method uses two different keys at once, a public key and a private key. The private key is know only to your computer. While, the public key is given to any computer that may want to communicate with it.

To decode a message a computer must use the public key (provided by the computer that it is communicating with) and it’s own private key.

In the example, Sally wants to send Bill a message. To do that, Sally needs to use Bill’s public key which is available to anyone. When Sally uses the public key it encrypts the message so that no one can read it. The only way that Bill will be able to see the message is when he uses his private key, the one that only he has (and is the only way to decode the encryption).

The message is available to anyone because all you need is the public key to pick it up. But, you won’t be able to read that message without a private key. The keys are a long string of numbers, and since they are based only on prime numbers, it makes this system very secure.

Examples of this type of encryption: Digital banking, Secure websites(https, SSL)

Photo Caesar Cipher by prize Lerthirunvibul

Photo PublicKeyEncryption by Kalani Hausman

Photo: WW2 Encryption: Enigma German Machine – cover off by Anthony Catalano [Creative Commons Attribution-NonCommercial-NoDerivs]