Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Monthly Archives: March 2021

Collaboration technology has been invaluable during the pandemic

TechRepublic: “The pandemic forced the enterprise to quickly pivot from familiar business practices and develop ways to successfully function while keeping employees safe. A new report from Zoom, The Impact of Video Communications During COVID-19, was released Thursday. “Video communications were suddenly our lifeline to society, enabling us to continue work and school in a… Continue Reading

Microsoft Teams new feature makes a written record of your meeting

ZDNet – “Microsoft is rolling out its AI-powered live transcription service in Microsoft Teams, answering Zoom’s recent expansion of its own live transcription feature.   Competition remains fierce in the video-meeting market for live transcription functionality. In December, Cisco announced its closed captioning service for Webex; Zoom last month brought live transcription to free accounts,… Continue Reading

Location data is the new growth market

TechDirt: “Location data is the new growth market. Data harvested from apps is sold to data brokers who, in turn, sell this to whoever’s buying. Lately, the buyers have been a number of government agencies, including the CBP, ICE, DEA, Secret Service, IRS, and — a bit more worryingly — the Defense Department. The mileage… Continue Reading

Bloom Cam Cherry Blossoms at the Tidal Basin

Trust for the National Mall – “Washington D.C.’s cherry blossoms signal the arrival of spring and symbolize hope, renewal, and friendship. With fewer visitors expected to see the blooming cherry trees in person this year, the Trust for the National Mall along with its partners, the National Park Service, The National Cherry Blossom Festival, and EarthCam, are bringing the beloved and blooming Cherry Trees to YOU during their peak bloom!… Continue Reading

FTC – Ignore bogus COVID vaccine survey

Division of Consumer and Business Education, FTC – “Scammers are using a new trick to steal your money and personal information: a bogus COVID vaccine survey. People across the country are reporting getting emails and texts out of the blue, asking them to complete a limited-time survey about the Pfizer, Moderna, or AstraZeneca vaccine. (And… Continue Reading

Digital Justice in 2058: Trusting Our Survival to AI, Quantum and the Rule of Law

Ritter, Jeffrey, Digital Justice in 2058: Trusting Our Survival to AI, Quantum and the Rule of Law (December 22, 2020). 8 J. INT’L & COMPARATIVE LAW __ (2021), Available at SSRN: https://ssrn.com/abstract=3778678 or http://dx.doi.org/10.2139/ssrn.3778678 “As legal scholarship on the interactions among artificial intelligence (AI) and the rule of law advances, quantum computing is rapidly moving… Continue Reading

Anyone with an iPhone can now make deepfakes

Washington Post – “We aren’t ready for what happens next. Realistic videos of people doing things that never really happened have become shockingly easy to create. Now is the time to put in some guardrails. The past few months have brought advances in this controversial technology that I knew were coming, but am still shocked… Continue Reading

Proposals to Modify Supreme Court Justices’ Tenure: Legal Considerations

CRS – Proposals to Modify Supreme Court Justices’ Tenure: Legal Considerations, March 24, 2021: “To insulate the federal judiciary from political influence, the Constitution specifies that Supreme Court Justices “shall hold their Offices during good Behaviour.” While the Constitution does not define “good Behaviour,” the prevailing interpretation is that Congress cannot remove Supreme Court Justices… Continue Reading

5 Common Cybercrime Attack Vectors and How to Avoid Them

MakeUseOf – “The threat landscape has significantly expanded with the proliferation of the internet and digital connectivity. As of March 2020, there were more than 677 million new malware detections. This figure by Statista indicates a growing threat of cyberattacks against individuals and businesses. Cybercriminals take advantage of cyberattack vectors to bypass your basic security… Continue Reading