Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Intellectual Property

The Chinese People’s Liberation Army in 2025

Via FAS – Secrecy News: The Chinese People’s Liberation Army in 2025 (Roy Kamphausen and David Lai, eds.), published July 2015 by the Strategic Studies Institute and the US Army War College Press. “China’s military research and development program is organized around 16 “national megaprojects” that are intended to advance and transform that country’s capabilities… Continue Reading

Spokeo v. Robins – Brief of Restitution and Remedies Scholars as Amici Curia in Support of Respondent

Laycock, Douglas and Gergen, Mark P. and Rendleman, Doug, Spokeo v. Robins – Brief of Restitution and Remedies Scholars as Amici Curia in Support of Respondent (September 11, 2015). Washington & Lee Legal Studies Paper No. 2015. Available for download at SSRN: http://ssrn.com/abstract=26603 “Both consumer protection and restitution may be casualties in a collision with… Continue Reading

Fair Use Under Copyright Law: Fair Use Books, Websites and Database Search Results

Via Reference Librarian David Dillard, Temple University: “I have a new Fair Use under Copyright Law Research guide that provides books with links to related content, websites, database search results for this topic as well as database search results for guides in fair use and a list of databases with fair use content and the… Continue Reading

White Paper – Empowering librarians with fact-based analytics

Playing “Moneyball” in Librarianship:  The Winning Strategy of Gap Analysis By Tommy Doyle Senior Vice President, Elsevier “…Researchers and students need both journals and books to build their knowledge around a topic. Journal content provides results of the latest research, while book content provides an interdisciplinary view, along with fundamental and comprehensive knowledge. Book content… Continue Reading

EY, LANL make new cybersecurity tools available to private sector

News release: “Ernst & Young LLP and Los Alamos National Laboratory have formed a strategic alliance to deliver some of the most advanced behavioral cybersecurity tools available to the commercial market. “Cybersecurity attacks are ever more frequent and more sophisticated, and they destroy the trust needed to conduct business,” said Duncan McBranch, Chief Technology Officer… Continue Reading

Intelligence Community and Its Use of Contractors: Congressional Oversight Issues

CRS via FAS – The Intelligence Community and Its Use of Contractors: Congressional Oversight Issue. L. Elaine Halchin, Specialist in American National Government. August 18, 2015. “Contractors have been and are an integral part of the intelligence community’s (IC’s) total workforce (which also includes federal employees and military personnel). Yet questions have been raised regarding… Continue Reading

Smithsonian Institution’s Plan for Increased Public Access to Results of Federally Funded Research

“PURPOSE: This document outlines the Smithsonian Institution’s plan to provide increased public access to certain peer-reviewed scholarly publications and supporting digital research data that arise from research funded, in whole or in part, by a federal funding source (hereinafter “Federally Funded Research Materials” or “FFRM”), consistent with the principles of access under the Office of… Continue Reading

Centre for Study of Existential Risk

“The Centre for Study of Existential Risk is an interdisciplinary research centre focused on the study of human extinction-level risks that may emerge from technological advances. We aim to combine key insights from the best minds across disciplines to tackle the greatest challenge of the coming century: safely harnessing our rapidly-developing technological power.” One of… Continue Reading

Where has the competitive intelligence gone? No worries – Call your Librarian!

Another day, another reason why librarians are mission critical – we are the multifaceted subject matter experts with multiple expertise – this would not have slipped by colleagues in the law library/news/business sectors if Google had asked (add other expert colleagues as you will – this is not about exclusion – but a request for… Continue Reading

ViewPoint – Great New Possibilities for the Library of Congress

Colleagues – we have worked for many years, often many decades, as members of a profession to which we have a deep and abiding commitment and through which we have, under often the most challenging of circumstances, helped to usher in the future without forsaking the past. So this snippet (the rest is behind a… Continue Reading

IP JUSTICE JOURNAL: Internet Infrastructure and IP Censorship

By David G. Post – August 1, 2015 Full Article as .PDF “Many scholars and other observers of developments in Internet governance, law, and policy have commented upon an unusual and important phenomenon that has become more widespread in recent years: using control over access to critical portions of the Internet’s technical infrastructure – the… Continue Reading

FireEye – Uncovering Malware Backdoor that Uses Twitter

FireEye announcement: “It hides in network communications, in all the noise—designed so that defenders can neither detect nor characterize its activity. But its purpose is transparent: to use Twitter, GitHub, and cloud storage services to relay commands and extract data from compromised networks. Download the report [reg. req’d] and read about the recently discovered HAMMERTOSS,… Continue Reading