Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Blogs

LLRX October 2019 New articles and columns

Articles and Columns for October 2019

  • Blockchain: What Information Professionals Need to KnowAnna Irvin, Ph.D. and Janice E. Henderson, Esq. presented this comprehensive 64 page guide at the LLAGNY Education Committee Program on October 15, 2019. The guide is an multidisciplinary resource that includes: articles from law, business and finance journals, CLE programs/materials, smart contracts, Westlaw and Practical Law citations, sources on the impact of blockchain on the U.S. government and the international regulatory landscape, as well as all states with blockchain and cybersecurity laws (introduced, pending and failed).
  • The How and the Why of Law Blogs – Legal technology evangelist, author and blogger Nicole L. Black recommends that a legal blog is one of the best ways to create a memorable and search-engine-friendly online presence. Simply put, blogs are a great way for lawyers to showcase legal expertise while increasing their firms’ search engine optimization—all while helping them to stay on top of changes in their areas of practice by writing about them on their firm’s blog.
  • Leaping Into Your Future with the Real-Life Mr. SpockBill Jensen’s fascinating interview with Prof. Sohail Inayatullah, UNESCO Chair in Future Studies at UNESCO and USIM, focuses on the future of work, leadership and the significance of the Key Performance Indicator [KPI].
  • How women’s life-long experiences of being judged by their appearance affect how they feel in open-plan officesDr. Rachel Morrison identifies and discusses research respective to open-plan workspaces. Her conclusion is that female and male employees differ in their perceptions of being observed and this fact should be acknowledged and incorporated into office design.
  • New Survey on Technology Use by Law Firms: How Does Your Firm Compare?Nicole L. Black recommends firm conduct a technology audit to review the need for software updates, to identify and replace outdated technology and applications, and to plan and implement migrating operations such as document management and time and billing systems to cloud computing.
  • Pete Recommends – Weekly highlights on cyber security issues, October 26, 2019Four highlights from this week: Equifax Allegedly Made It Super Easy to Hack Customer Data; New App Helps Prevent Fraud at the Gas Pump; The Wayback Machine’s Save Page Now is New and Improved; and Trading in your phone may pose a risk to your data, one expert warns.
  • Pete Recommends – Weekly highlights on cyber security issues, October 19, 2019Four highlights from this week: Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid; US, UK agencies issue joint VPN security alert; New Report: “The Market of Disinformation”; and Plan for the Future. Manage the Present. Open or access your my Social Security account today.
  • Pete Recommends – Weekly highlights on cyber security issues, October 12, 2019Four highlights from this week: Americans and Digital Knowledge; 10 Tips to Avoid Leaving Tracks Around the Internet; Proving You’re You: How Federal Agencies Can Improve Online Verification; and New Report: “World’s First Deepfake Audit Counts Videos and Tools on the Open Web”.
  • Pete Recommends – Weekly highlights on cyber security issues, October 5, 2019Four highlights from this week: EU can force Facebook and social media platforms to remove content globally; How to Set Your Google Data to Self-Destruct; The whistleblowing process, explained; and ABA Tech Report 2019.

LLRX.com® – the free web journal on law, technology, knowledge discovery and research for Librarians, Lawyers, Researchers, Academics, and Journalists. Founded in 1996.

How to create RSS Feeds from Twitter

RSS.app: “Twitter is a great tool to stay up-to-date with everything that is happening: news, hobbies and interests, celebrities and influencers. However, some users prefer to consume and monitor this information via RSS feeds using RSS readers or custom integrations within their own apps. RSS.app allows users to create RSS feeds from any public Twitter… Continue Reading

Today’s Document From NARA’s Tumblr

“Today’s Document started as a small feature on the Archives.gov website several years ago, as a way to highlight interesting documents in our holdings—both the well-known and the obscure—and to observe historical events (usually the significant events but sometimes just the curious ones). Today’s Document is now a popular feature and has inspired a new… Continue Reading

Google Search is being routinely gamed by fake blogs and has been for years

unlike kinds -“Since its earliest days, the core of Google’s search algorithm – and its greatest innovation – has been ranking a page by the amount and quality of the links pointing to it. For almost as long, businesses have fought to climb to the lucrative top positions on search result pages, with some resorting… Continue Reading

Commentary – How to stop fake news? Take responsibility

The Next Web: The only way to stop fake news is for you to take responsibility: “Trump has made a lot of things buzzworthy, but perhaps none more than “fake news.” Everyone has strong opinions about who is at fault for spreading lies in the press. It’s “the media’s” fault. It’s Trump’s fault. Before Trump,… Continue Reading

Please Vote for BeSpacific – Best Legal Tech Blog 2019

Greetings friends, colleagues: my blog BeSpacific has been nominated (4 years in a row) in the category Best Legal Legal Tech Blog. Please take a minute – before the December 16, 2018 deadline – and vote for BeSpacific here – https://www.theexpertinstitute.com/legal-blog/bespacific/ and share this request with your friends and colleagues as well. There are no… Continue Reading

Using Twitter to Visualize Polarization

Center for Data Innovation – “MIT Technology Review has created a set of visualizations that uses data about Twitter activity to illustrate the polarization of political discourse in the United States. The visualizations include multiple cluster maps demonstrating that accounts that follow each other tweet similar content. In addition, diagrams show that the most partisan… Continue Reading

Penetrating a Social Network: The Follow-back Problem

Penetrating a Social Network: The Follow-back Problem Fanyu Que, Krishnan Rajagopalan, Tauhid Zaman (Submitted on 8 Apr 2018) arXiv:1804.02608 [cs.SI] (or arXiv:1804.02608v1 [cs.SI] for this version) “Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims.… Continue Reading

Inside Facebook, Twitter and Google’s AI battle over your social lives

CNET: “When you sign up for Facebook on your phone, the app isn’t just giving you the latest updates and photos from your friends and family. In the background, it’s utilizing the phone’s gyroscope to detect subtle movements that come from breathing. It’s measuring how quickly you tap on the screen, and even looking at… Continue Reading

5 Tools to Help You Search the Archived Internet

Tech.Co – Adam Rowe: “The archived internet deserves more recognition. Online security has been a hot button topic in the tech community recently, with data scandals and privacy policy updates constantly driving the conversation. But, keeping the internet a stable and reliable network isn’t all about data security – it’s also about data preservation. Anything… Continue Reading