- TimeMap is a litigation tool that creates graphic chronological timelines that you
- It’s the place to record what you know about the witnesses, organizations, and
- When you create a project, Binder prompts you to synchronize it.
- These features accelerate and simplify transcript navigation.
- Strategy, Tactics and Execution: Litigation Software
Category Archives: monitar
These different ways to automate document production vary in what they can produce, their cost, their level of complexity and customizability, and the level of interactivity or intelligence they use in creating documents. The choice you make will depend on … Continue reading
Regardless of the area of law you practice in, there will be at least a handful, if not many documents, that you generate over and over and over again. Thus, anything that lets you increase the speed, accuracy and consistency … Continue reading
For the reasons discussed above, the greatest strength of trusted computing is in providing components which can be used to give assurances to desktop users about the integrity of their operating environments. This may be achieved through providing extra … Continue reading
This system, in the style of SETI@home, distributed hundreds of thousands of climate modelling tasks to users around the world. It was under a duty to protect the climate model code, but also, of course, needed to offer reassurance that … Continue reading
As of late 2008, more than 200m TPM chips have been shipped in laptops, worldwide. It is estimated that a large majority of all new ‘business class’ laptops are now equipped with this device, and a large proportion of those … Continue reading
For a range of reasons, whole system virtualization is becoming a popular way to manage server environments, and increasingly desktop systems too. Running virtual machines can be migrated and copied, and allow for both good utilization of resources and also … Continue reading
The process of remote attestation is based upon the root of trust for reporting: this is implemented as the Endorsement Key (EK). The credentials accompanying the EK are the proof for a third party that the platform they are interacting … Continue reading
We have used the term ‘trust’ informally above. This notion is, of course, the subject of stacks of literature: in computing, in sociology and psychology, and so on. Indeed, the word is sufficiently over-loaded that Gollman (2004) was able to … Continue reading
Video is rapidly transitioning from a niche interest to mainstream adoption. Last year the proportion of network traffic generated by video crossed the 50-percent threshold, a number that is projected to increase to more than 90 percent by 2013 (Cisco … Continue reading