My Recent 5 by 5 Post on Legal Technology

My Recent 5 by 5 Post on Legal Technology. Matt “the [non]billable hour” Homann periodically runs a feature on his blog called “Five by Five” that features five experts answering a thought-provoking question. I recently participated with legal tech experts Ron Friedmann, Jerry Lawson, Jeff Beard and Kevin Heller in a Five by Five on… Continue reading My Recent 5 by 5 Post on Legal Technology

SP2 Testing and Migration Guide

SP2 Testing and Migration Guide. Yesterday, Microsoft published the “Application Compatibility Testing and Mitigation Guide for Windows XP Service Pack 2,” available here. I highly recommend the guide to Windows developers and any company planning to deploy SP2 (That should be every one running Windows XP). Besides documentation, the testing guide also provides scripts that… Continue reading SP2 Testing and Migration Guide

Cryptanalysis of MD5 and SHA: Time for a new standard

Cryptanalysis of MD5 and SHA: Time for a new standard. Bruce Schneier talks about the recent reported weaknesses in common hash functions such as MD5. He writes: As a user of cryptographic systems — as I assume most readers are — this news is important, but not particularly worrisome. MD5 and SHA aren't suddenly insecure.… Continue reading Cryptanalysis of MD5 and SHA: Time for a new standard

Collaborative knowledge gardening

InfoWorld: Collaborative knowledge gardening. Jon Udell. To CTOs, though, I'd say that both are collaborative systems for building a shared database of items, developing a metadata vocabulary about the items, performing metadata-driven queries, and monitoring change in areas of interest. In the case of Flickr, an item is a photo; in the case of del.icio.us,… Continue reading Collaborative knowledge gardening

The layers of security I use to keep criminals at bay

The layers of security I use to keep criminals at bay. Tim Anderson: SP2 debate exposes deeper problems. ZDNet's David Berlind: SP2's new firewall: better than nothing, but not good enough. Security is an interesting issue. How much security is good enough? Let's get out of the computer world. Let's talk about heirloom jewelry. My… Continue reading The layers of security I use to keep criminals at bay

You're Athletes, Not Journalists

You're Athletes, Not Journalists. Olympians can do media interviews but they'd better not blog. The International Olympic Committee, interested in protecting lucrative broadcasting contracts, forbids any activity that might upset the networks. [Wired News]