- TimeMap is a litigation tool that creates graphic chronological timelines that you
- It’s the place to record what you know about the witnesses, organizations, and
- When you create a project, Binder prompts you to synchronize it.
- These features accelerate and simplify transcript navigation.
- Strategy, Tactics and Execution: Litigation Software
Category Archives: laptop
TimeMap is a litigation tool that creates graphic chronological timelines that you can print and enlarge—adding charts to your persuasive arsenal. In particular, you can explore and demonstrate the time-based relationships between key case events.TimeMap visuals contain three items only: … Continue reading
It’s the place to record what you know about the witnesses, organizations, and documents around which the case revolves. It’s the place to trap the questions you have about the case, including who should find the answer and by when. … Continue reading
When you create a project, Binder prompts you to synchronize it. Answering “Yes” to the prompt synchronizes the case; that is, it makes all transcripts available offline so that if someone leaves the office he or she can take the … Continue reading
It is a piece of shareware and costs US$29.95. In essence it is much more powerful version of the AutoCorrect feature in Word. ActiveWords allows you to create keyboard shortcuts for the insertion of standard wording such as contact information … Continue reading
With more and more mobile and portable devices seeking intermittent access to networks, the problem of network access control is increasingly acute. Connection to a particular network segment often conveys — or helps to convey — access privilege for local … Continue reading
The question of what, then, to attest, and how to attest the semantics of software — its behaviour, rather than its binary signature—is a topic for active research. The ‘late launch’ capabilities we described above, with a dynamic root of … Continue reading
The approaches described above have the potential to alter radically the design both of end-user desktop systems, and distributed applications. It is certainly novel to have a strong guarantee of what software is running — locally and remotely — coupled … Continue reading
The architecture allows for two separate suites of functionality: a ‘remote owner’ MTM (MTRM) and a ‘local owner’ MTM (MTLM). The latter is intended to offer TPM-like capabilities to user-level applications, and so is virtually indistinguishable from the current TPM … Continue reading
This is described as ‘sealing’ data to a particular platform state. We would, of course, expect the TPM to be managing the secret key used for the decryption, ensuring that it is not available for arbitrary cryptographic operations. Both of … Continue reading
The same challenges apply to any system we interact with across the network, with the added complexity that because we cannot see or touch the servers involved, we have to take a whole lot more on trust. We generally have … Continue reading