- TimeMap is a litigation tool that creates graphic chronological timelines that you
- It’s the place to record what you know about the witnesses, organizations, and
- When you create a project, Binder prompts you to synchronize it.
- These features accelerate and simplify transcript navigation.
- Strategy, Tactics and Execution: Litigation Software
Category Archives: hardware
Generally speaking, litigation support programs can be divided into two groups: those that provide transcript management and search functions; and, those that provide a database for gathering, organizing and searching other case information. Some programs, like Summation, combine these features … Continue reading
Inexpensive flat bed scanners generally lack automatic document feeders (“ADF’s”). As a result this type of scanner cannot process paper quickly enough to be useful. Desktop, egg-carton style, sheet fed scanners likewise are too slow to provide much benefit. However, … Continue reading
One folder contains the native application files, the other the PDF versions. For example, correspondence files created with WordPerfect are stored in a subfolder named “CorresWPD.” All correspondence files in PDF format are stored in a subfolder called “CorresPDF.” A … Continue reading
Although we have remarked that this paradigm of trusted computing is at its strongest when assuring local owners (or users) of the state of their platforms, it is notable that much of the active research in this area relates to … Continue reading
The mobile platform is instructive because it comes with much stronger trust requirements than the PC. The radio frequency component is subject to substantial regulation: it is not acceptable to allow arbitrary software to change its operating parameters. Airtime is … Continue reading
This is, then, a very short chain of trust, and by having it launched by a piece of inherently trustworthy code (untainted by anything else which has happened since the platform was rebooted), the platform can jump directly into a … Continue reading
There are many ways in which a computing platform may fail to enable the steps to trust outlined above. (For the purposes of this section, we will consider mainly the PC platform; later sections will broaden that notion). In order … Continue reading
Graeme Proudler says (Mitchell, 2005, chapter 2) that it is safe to trust something when: 1. it can be unambiguously identified, and 2. it operates unhindered, and 3. the user has first-hand experience of consistent, good, behaviour or the users … Continue reading
More companies are realizing the potential for social software to unlock new levels of productivity and knowledge sharing in the enterprise, but have concerns about how to implement it. The millennial workforce grew up with Twitter and Facebook and expects … Continue reading