Category Archives: hardware

Strategy, Tactics and Execution: Litigation Software

Generally speaking, litigation support programs can be divided into two groups: those that provide transcript management and search functions; and, those that provide a database for gathering, organizing and searching other case information. Some programs, like Summation, combine these features … Continue reading

Posted in hardware, keybord | Leave a comment

Inexpensive flat bed scanners generally lack automatic document feeders

Inexpensive flat bed scanners generally lack automatic document feeders (“ADF’s”). As a result this type of scanner cannot process paper quickly enough to be useful. Desktop, egg-carton style, sheet fed scanners likewise are too slow to provide much benefit. However, … Continue reading

Posted in hardware, keybord | Leave a comment

One folder contains the native application files, the other the PDF versions.

One folder contains the native application files, the other the PDF versions. For example, correspondence files created with WordPerfect are stored in a subfolder named “CorresWPD.” All correspondence files in PDF format are stored in a subfolder called “CorresPDF.” A … Continue reading

Posted in hardware, keybord | Leave a comment

Active Research

Although we have remarked that this paradigm of trusted computing is at its strongest when assuring local owners (or users) of the state of their platforms, it is notable that much of the active research in this area relates to … Continue reading

Posted in giveaway, hardware | Leave a comment

The mobile platform is instructive because it comes with much stronger trust requirements than

The mobile platform is instructive because it comes with much stronger trust requirements than the PC. The radio frequency component is subject to substantial regulation: it is not acceptable to allow arbitrary software to change its operating parameters. Airtime is … Continue reading

Posted in giveaway, hardware | Leave a comment

This is, then, a very short chain of trust, and by having it launched by a piece of inherently

This is, then, a very short chain of trust, and by having it launched by a piece of inherently trustworthy code (untainted by anything else which has happened since the platform was rebooted), the platform can jump directly into a … Continue reading

Posted in hardware, OPERTING SYSTEM | Leave a comment

Trusted Computing Platforms

There are many ways in which a computing platform may fail to enable the steps to trust outlined above. (For the purposes of this section, we will consider mainly the PC platform; later sections will broaden that notion). In order … Continue reading

Posted in hardware, keybord | Leave a comment

Graeme Proudler says (Mitchell, 2005, chapter 2) that it is safe to trust something when:

Graeme Proudler says (Mitchell, 2005, chapter 2) that it is safe to trust something when: 1. it can be unambiguously identified, and 2. it operates unhindered, and 3. the user has first-hand experience of consistent, good, behaviour or the users … Continue reading

Posted in hardware, keybord | Leave a comment

Enterprise-Class Social Software

More companies are realizing the potential for social software to unlock new levels of productivity and knowledge sharing in the enterprise, but have concerns about how to implement it. The millennial workforce grew up with Twitter and Facebook and expects … Continue reading

Posted in hardware, keybord | Leave a comment

Support for Emerging Consumer Platforms

According to recent surveys, up to 80 percent of the Fortune100 and 60 percent of the Fortune 500 companies now claim to have tablet users (The Wall Street Journal February 2011) – in many cases in the executive suite, not … Continue reading

Posted in giveaway, hardware | Leave a comment