Last week I attended the sixth annual CodeX FutureLaw Conference, under the canopy of the redwoods on the Stanford University campus. I did not know entirely what to expect, but as my office is a few miles down El Camino Real from Stanford, I thought that it was worth investigating. I found the event to be stimulating and I would like to share what I learned so that others may consider attending FutureLaw in the future.
What is CodeX? It is a Stanford group, associated with the Law School, whose mission is to create legal technology that empowers all parties. It is ably headed up by Dr. Roland Vogl.
By Mobile Helix CEO & Co-founder, Seth Hallem in Legal IT Professionals
A good lawyer helps you see around the bend. In my experience over the years as a client, I have found that each time my attorney points out something in a contract or business decision that I had not anticipated, I ignore the next bill when it comes in and I pay it gladly. When I feel that my attorney is simply a contract factory, I look at each bill closely and start to wonder if there is a better way.
I recently had this experience with my company’s attorney and, as has become my custom, I did not pay any attention to the forthcoming invoice. I did, however, stop to think about how my company, as a legal technology provider, could facilitate more such interactions for our customers and their clients.
A few months ago, I read an article summarizing a survey conducted by
Clio. The headline of this survey is that lawyers bill only 2.3 of
every 8 working hours, instead spending the plurality of their day on
administrative tasks. This article jogged my memory of another article
from the American Psychological Association (APA) that outlined the
significant productivity lost due to context switching and distractions.
If my attorney is to be a source of insight, he or she cannot be
compromised by distractions that lessen her effectiveness.
Mobility is progressing rapidly. In the past 6 months, with our 3.4 release, our LINK app has added capabilities that enable lawyers to be truly responsive and productive from tablets and smartphones.
View the recording of the webinar here.
By Mobile Helix CEO and Co-founder, Seth Hallem
Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.
By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).
Meltdown and Spectre reveal that perfect information protection comes at an increasingly steep cost.
In the field of data security, 2018 began with a jolt. The revelation
of the Meltdown and Spectre security vulnerabilities has taught us that
in 2018 (and beyond), nothing is sacred.
Speculative execution, the architectural concept that is exploited in the Spectre vulnerability, has been in use by mainframe processors since the mid-1970s. It is taught in Computer Architecture 101 in universities around the world. And yet, it turns out that the security implications were never fully understood until about seven months ago.
Out-of-order execution, the culprit in the Meltdown
vulnerability, is also a ubiquitous concept, although Meltdown is easily
avoided with a better implementation of the concept.
Peripatetic lawyers, take note from Friday, 1/5/2018, in the Washington Post:
“U.S. customs agents conducted 60 percent more searches of travelers’ cellphones, laptops and other electronic devices during the government’s 2017 fiscal year, according to statistics released Friday by U.S. Customs and Border Protection (CBP).
The agency said it searched 30,200 devices but the inspections affected only 0.007 percent of the 397 million travelers — including American citizens as well as foreign visitors — who arrived from abroad during the 12-month period that ended Sept 30.”1