- TimeMap is a litigation tool that creates graphic chronological timelines that you
- It’s the place to record what you know about the witnesses, organizations, and
- When you create a project, Binder prompts you to synchronize it.
- These features accelerate and simplify transcript navigation.
- Strategy, Tactics and Execution: Litigation Software
Category Archives: keybord
TimeMap is a litigation tool that creates graphic chronological timelines that you can print and enlarge—adding charts to your persuasive arsenal. In particular, you can explore and demonstrate the time-based relationships between key case events.TimeMap visuals contain three items only: … Continue reading
It’s the place to record what you know about the witnesses, organizations, and documents around which the case revolves. It’s the place to trap the questions you have about the case, including who should find the answer and by when. … Continue reading
Generally speaking, litigation support programs can be divided into two groups: those that provide transcript management and search functions; and, those that provide a database for gathering, organizing and searching other case information. Some programs, like Summation, combine these features … Continue reading
It is a piece of shareware and costs US$29.95. In essence it is much more powerful version of the AutoCorrect feature in Word. ActiveWords allows you to create keyboard shortcuts for the insertion of standard wording such as contact information … Continue reading
Inexpensive flat bed scanners generally lack automatic document feeders (“ADF’s”). As a result this type of scanner cannot process paper quickly enough to be useful. Desktop, egg-carton style, sheet fed scanners likewise are too slow to provide much benefit. However, … Continue reading
One folder contains the native application files, the other the PDF versions. For example, correspondence files created with WordPerfect are stored in a subfolder named “CorresWPD.” All correspondence files in PDF format are stored in a subfolder called “CorresPDF.” A … Continue reading
With more and more mobile and portable devices seeking intermittent access to networks, the problem of network access control is increasingly acute. Connection to a particular network segment often conveys — or helps to convey — access privilege for local … Continue reading
The question of what, then, to attest, and how to attest the semantics of software — its behaviour, rather than its binary signature—is a topic for active research. The ‘late launch’ capabilities we described above, with a dynamic root of … Continue reading
The foregoing discussion implies a need for a change— a relatively minor one — to the architecture of the PC. A Trusted Platform Module (TPM) has been defined (as a logical bundle of functionality), together with a means to embed … Continue reading