Category Archives: laptop

TimeMap is a litigation tool that creates graphic chronological timelines that you

TimeMap is a litigation tool that creates graphic chronological timelines that you can print and enlarge—adding charts to your persuasive arsenal. In particular, you can explore and demonstrate the time-based relationships between key case events.TimeMap visuals contain three items only: … Continue reading

Posted in keybord, laptop | Leave a comment

It’s the place to record what you know about the witnesses, organizations, and

It’s the place to record what you know about the witnesses, organizations, and documents around which the case revolves. It’s the place to trap the questions you have about the case, including who should find the answer and by when. … Continue reading

Posted in keybord, laptop | Leave a comment

When you create a project, Binder prompts you to synchronize it.

When you create a project, Binder prompts you to synchronize it. Answering “Yes” to the prompt synchronizes the case; that is, it makes all transcripts available offline so that if someone leaves the office he or she can take the … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

It is a piece of shareware and costs US$29.95. In essence it is much more powerful

It is a piece of shareware and costs US$29.95. In essence it is much more powerful version of the AutoCorrect feature in Word. ActiveWords allows you to create keyboard shortcuts for the insertion of standard wording such as contact information … Continue reading

Posted in keybord, laptop | Leave a comment

Trusted Network Connect

With more and more mobile and portable devices seeking intermittent access to networks, the problem of network access control is increasingly acute. Connection to a particular network segment often conveys — or helps to convey — access privilege for local … Continue reading

Posted in keybord, laptop | Leave a comment

The question of what, then, to attest, and how to attest the semantics of software — its behaviour,

The question of what, then, to attest, and how to attest the semantics of software — its behaviour, rather than its binary signature—is a topic for active research. The ‘late launch’ capabilities we described above, with a dynamic root of … Continue reading

Posted in keybord, laptop | Leave a comment

Impact of Trusted Computing

The approaches described above have the potential to alter radically the design both of end-user desktop systems, and distributed applications. It is certainly novel to have a strong guarantee of what software is running — locally and remotely — coupled … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM)

The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM) and a ‘local owner’ MTM (MTLM). The latter is intended to offer TPM-like capabilities to user-level applications, and so is virtually indistinguishable from the current TPM … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

This is described as ‘sealing’ data to a particular platform state.

This is described as ‘sealing’ data to a particular platform state. We would, of course, expect the TPM to be managing the secret key used for the decryption, ensuring that it is not available for arbitrary cryptographic operations. Both of … Continue reading

Posted in laptop, laptop product reivew | Leave a comment

The same challenges apply to any system we interact with across the network,

The same challenges apply to any system we interact with across the network, with the added complexity that because we cannot see or touch the servers involved, we have to take a whole lot more on trust. We generally have … Continue reading

Posted in laptop, laptop product reivew | Leave a comment