- TimeMap is a litigation tool that creates graphic chronological timelines that you
- It’s the place to record what you know about the witnesses, organizations, and
- When you create a project, Binder prompts you to synchronize it.
- These features accelerate and simplify transcript navigation.
- Strategy, Tactics and Execution: Litigation Software
Category Archives: laptop product reivew
When you create a project, Binder prompts you to synchronize it. Answering “Yes” to the prompt synchronizes the case; that is, it makes all transcripts available offline so that if someone leaves the office he or she can take the … Continue reading
These different ways to automate document production vary in what they can produce, their cost, their level of complexity and customizability, and the level of interactivity or intelligence they use in creating documents. The choice you make will depend on … Continue reading
For the reasons discussed above, the greatest strength of trusted computing is in providing components which can be used to give assurances to desktop users about the integrity of their operating environments. This may be achieved through providing extra … Continue reading
This system, in the style of SETI@home, distributed hundreds of thousands of climate modelling tasks to users around the world. It was under a duty to protect the climate model code, but also, of course, needed to offer reassurance that … Continue reading
The approaches described above have the potential to alter radically the design both of end-user desktop systems, and distributed applications. It is certainly novel to have a strong guarantee of what software is running — locally and remotely — coupled … Continue reading
The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM) and a ‘local owner’ MTM (MTLM). The latter is intended to offer TPM-like capabilities to user-level applications, and so is virtually indistinguishable from the current TPM … Continue reading
The process of remote attestation is based upon the root of trust for reporting: this is implemented as the Endorsement Key (EK). The credentials accompanying the EK are the proof for a third party that the platform they are interacting … Continue reading
This is described as ‘sealing’ data to a particular platform state. We would, of course, expect the TPM to be managing the secret key used for the decryption, ensuring that it is not available for arbitrary cryptographic operations. Both of … Continue reading
We have used the term ‘trust’ informally above. This notion is, of course, the subject of stacks of literature: in computing, in sociology and psychology, and so on. Indeed, the word is sufficiently over-loaded that Gollman (2004) was able to … Continue reading
The same challenges apply to any system we interact with across the network, with the added complexity that because we cannot see or touch the servers involved, we have to take a whole lot more on trust. We generally have … Continue reading