Google has been famously testing out their version of a driverless car. The company wants to transform transportation by taking the driver out of the equation.

Driverless cars will be able to shuttle people from place to place while reducing the human error that is often the catalyst for road accidents.The California Department of Motor Vehicles recently made a proposal of rules for driverless cars. These new rules were presented for public commentary in mid December of 2015. The DMV wants to involve the public and will be hosting two workshops early in 2016, one in Sacramento and the other in Los Angeles.This proposal draft is the next step in allowing driverless cars on California roads. But Google is unhappy about one of the provisions.

The regulators are calling for the manufacturers of driverless cars to meet several safety and performance standards. These include things such as protecting the privacy of operators from the needless collection of user data and having a third party independently access performance. The rules also call for a licensed human driver, capable of taking over the steering wheel and pedals in the event of an emergency. The problem is that Google’s prototype for a driverless car does not have a steering wheel or pedals.

Google’s maintains that it wants to improve safety by equipping the car itself with protocols that surpass what a human could detect. For instance their cars have sensors that detect objects as far as two football fields away–in all directions. The state of California is looking at the broader aspect of autonomous cars, and remains more conservative on the issue. They  have warned Google in the past to add steering wheels and pedals. California legislators pushed The DMV to require that driverless cars contain wheels and people to steer them whenever they’re operated on public roads.

Google is disappointed that California legislators are limiting the potential of fully autonomous vehicles, the company said. Although the company is still in the prototyping phase where changes can easily be made, it is still a setback.

 

Article via TechNewsWorld, 18th December 2015

Photo:Auto che guidano da sole. Forse non le vedremo mai sulle nostre strade by Automobile Italia [Creative Commons Attribution-NonCommercial-NoDerivs]

Internet security is an important topic to address for anyone who surfs the web. Many of us want to be sure that our private data is being handled securely. The most popular way to protect our data online is through encryption. Encryption of data simply means that the information is encoded so that it can only be read by a key used to decode it. It sounds like super spy stuff, and in a way it is (that is a German enigma machine pictured above). In this article, we will discuss some of the ways that encryption is used to protect our data on the internet.

Computer encryption is based on cryptography, the practice and study of techniques to secure information. If you have ever heard of the Caesar cipher, that is a form of encryption. In our modern era, computers are generating complex algorithms that are used as the ciphers that crack the code.

There are two main modes of encryption: symmetric key and public key.

Symmetric key encryption

Caesar_Cipher
Caesar Cipher by prize Lerthirunvibul

The Caesar cipher is a great example of this. A letter is written to a friend, but all the words are spelled out by rotating the letter in the alphabet 4 spaces. This makes the letter nonsensical to anyone who intercepts it. But the friend it was written to knows the code (shift 4 spaces) and can therefore decode the letter.

The same happens in computing. Each computer has a secret code. The is a packet of information that is transported between the two computers. Once the transfer is complete the second computer decodes the encrypted packet.

Examples of this type of encryption: Hard drives, Private networks

 

Public key encryption

public key encryption
PublicKeyEncryption by Kalani Hausman

Sometimes this is called asymmetric key encryption. The main difference here is that each party does not have the same code to encrypt the message. Instead this method uses two different keys at once, a public key and a private key. The private key is know only to your computer. While, the public key is given to any computer that may want to communicate with it.

To decode a message a computer must use the public key (provided by the computer that it is communicating with) and it’s own private key.

In the example, Sally wants to send Bill a message. To do that, Sally needs to use Bill’s public key which is available to anyone. When Sally uses the public key it encrypts the message so that no one can read it. The only way that Bill will be able to see the message is when he uses his private key, the one that only he has (and is the only way to decode the encryption).

The message is available to anyone because all you need is the public key to pick it up. But, you won’t be able to read that message without a private key. The keys are a long string of numbers, and since they are based only on prime numbers, it makes this system very secure.

Examples of this type of encryption: Digital banking, Secure websites(https, SSL)

Photo Caesar Cipher by prize Lerthirunvibul

Photo PublicKeyEncryption by Kalani Hausman

Photo: WW2 Encryption: Enigma German Machine – cover off by Anthony Catalano [Creative Commons Attribution-NonCommercial-NoDerivs]

Recently President Obama got a Facebook page. The reason he stated was to make it easier for the public to have access to the president. He also wanted to have more conversations with real people. Using social media to make connections and grow relationships is a  great way to harness the power of a social media presence. For a lawyer, social media can be a way to be more visible and to reach more clients.

The goal of social media is to get noticed. In the social media world, it means being at the forefront of people’s mind. You can achieve that by making posts that stand out in people’s feeds. The trick is to say things that are interesting to  your followers so that they repost your content. In this post, we will look at ways that social media can help your business.

  1. Social media is an easy way to learn your audience. No matter the industry, it is always beneficial to have insight into who is interested in your product or service. Using social media will allow you to build an audience. As this audience builds you can use tools like google analytics. This allows you to see information about your audience like their age, location, and what posts are being read the most.
  2. Social media can help increase traffic to your website. Many law firms have a site showcasing their business. Having active social media accounts with good content can help drive people to your website. In addition to helping drive new customers to your site, it will also increase your rank in search engines making it easier for other new clients to find you.
  3. Social media helps generate leads for one third the cost. Outside of creating content in the form of posts and picture, you can use social media to advertise your business. Facebook ads and twitter ads allow a firm to easily reach a large audience for a very low price. Advertising starts on some platforms at just 5 dollars. Analytics associated with advertising can be reviewed with known data about your audience so that ads can be targeted to specific audiences.

Social media is fast and delivers news and updates at a record pace. It is also a great way to build your brand and make your clients aware that your firm exists. Don’t over look using social media as a means of improving your relationships with current and future clients.

Photo: social media class via mkhmarketing [Creative Commons Attribution-NonCommercial-NoDerivs]

According to the International Telecommunication Union, there are about 3.2 billion people online. Mobile networks are leading the way to connecting people for the next generation of communications. There are about 7.1 billion subscriptions globally and 95% of people in the world are within reach of a mobile network signal.

The Republic of Korea leads the world as the most-connected place. European countries along with Southeast Asia countries Japan and China follow afterwards. The United States comes at #15. This is with respect to Internet connectivity and how well data services are adopted in that country. The list below does not correlate with how fast the country’s economy is growing. Rather, it correlates with how many people have online access in that country.

Photo via TechCrunch

Photo Credit: TechCrunch

The downside of this news is that there are still about 350 million without Internet access. These include people in some of the poorest countries in the world, such as Malawi, Madagascar, Ethiopia, Eritrea and Chad, which are the five least-connected countries globally in descending order. These countries are referred to as least developed countries, or LDCs.  Projects such as Project Loon by Google and “Free Basics” by Facebook are attempting to resolve this extreme gap.

There has been an improvement of the “middle class” countries pertaining to the Information and Communication Technology (ICT) Developmental Index (IDI) growth. Universal online access contributes to globalization.

Article via TechCrunch, Nov 30, 2015

Photo: Vardøger [Déjà Vu] by Chris JL [Creative Commons Attribution-NonCommercial-NoDerivs]

 

Lawyers are a conservative group when it comes to adopting new technology. This continue to hold true for the ever popular cloud technologies. Concerns about privacy and security related to data breaches are holding some firms back from transitioning over to cloud storage and services. In a 2015 Cloud Security Survey released Netwrix reveals the concerns around cloud adoption among lawyers include: security and privacy of data (26 percent), migration costs (22 percent) and loss of physical controls (17 percent). Moreover, security risks include unauthorized access (32 percent), insider misuse (18 percent) and account hijacking (18 percent.)

Alex Vovk, CEO and co-founder of Netwrix, told Legaltech News “Legal departments will be reluctant to entrust their valuable data and customers’ sensitive information, until they are absolutely sure that cloud providers can offer better security than the company can ensure on-premises.” Although data security is a privacy issue for all industries, legal departments are less likely to adopt technologies that do not guarantee full protection for their data.

Law firms may be cautious, but that doesn’t mean that they are uninterested in cloud technologies. According to the survey, 44 percent of the respondents indicated they their firms were in a stage of evaluation and discovery concerning cloud services. “This indicates that [law firms] are potentially ready to invest more in additional cloud security and consider various cloud options,” Vovk said. In fact, when it comes to hybrid cloud models, legal entities have the same interest in making the transition as private companies. In addtion, 37 percent of those surveyed favor a private cloud model.

Vovk summed up by stating that “… as soon as cloud providers are ready to provide additional security measures and to some extent ease the compliance burden …lawyers would become less skeptic[al] about cloud adoption.”

Article via Legaltech News, 3 December 2015

Photo: Cloud Solutions via NEC Corporation of America [Creative Commons Attribution-NonCommercial-NoDerivs]

If you haven’t heard of TED yet, it’s a nonprofit organization devoted to Ideas Worth Spreading. The main conference is held in California and was started 25 years ago, and it’s influence has been growing exponentially since then. All other TED events are called TEDx and are independently organized TED-like events with the same mission. These events often discuss science, technology, education and communication and have been known to spark innovation and social change by  providing the opportunity to shed light on less known facts and causes that are happening at a  local level.

I had the pleasure of attending the TEDxHouston 2015 event this year, where there were several talks  highlighting themes of social change, innovation and technology.

Teresa O’Donnell, Founder of  Plant It Forward  , spoke of her professional life as an entrepreneur. In an effort to do more community work through her company, she studied and became more informed on the plight of refugees coming to America.  For those who seek refuge in this country, it takes a minimum of 5 years to achieve that status. A refugee must prove that conditions in their  home country are incredibly difficult (persecution and war)and that it  has become impossible for them to return home without fearing for their lives. Houston, Texas in particular has received a large number of these refugees. Once the refugees arrive in the United States, they face the confounding problem of not speaking the dominant language, as well as not having transferable work skills.

To solve this problem, Plant It Forward partners with social and church groups to provide land and tools to refugees who settle in Houston with few other skills besides farming. Houston now has a growing community of organic gardens that sell  fresh fruit farmed by refugees at local farmers markets. Through Plant It Forward farms, refugees have the opportunity to build a life for themselves and their family while enriching the city with their farming skills.

Enriching the city was a theme that arose continually throughout the day. Susan Rogers focused on  community development and city planning; she works as a designer, professor and director of the Community Design Resource Center (CDRC) in Houston. The CDRC’s  goal is to use design to enhance change in the community and are focused on serving the public interest by improving the development of all communities. She spoke specifically about the economic disparities existing between the eastern and western half of the city, and how this is reflected in the design and therefore service of the communities. By preserving the culture and uniqueness of all neighborhoods, it improves other public services that cater to their residents, thereby raising the standard of life for all.

Talks like these are not just  happening in the United States, they happen all over the world. In 2015 there are over 3000 Ted events scheduled with talks about everything from education, to medicine, to life and career.

TED around the world

If you don’t have time to attend a TED event, you can easily watch a recording which is  available for free at TED.com. Talks are even arranged by topic and influence in convenient playlists.

The true power of TED comes from the opportunity to see the world through someone else’s eyes, and become aware of possibilities that you may not have known existed. TED provides a platform to bring to light issues that are too often not discussed and gives insight into the wonder of the human spirit,  reminding us how truly amazing it is to reimagine the world the way that we believe it should be.

Photo via: Ted.com