Lessons learned from Arab Spring? You may have to put up with peaceful protest, but you don't have to provide their organizational tools...
"Yesterday, in an effort to disrupt rumored protests at Bay Area Rapid Transit stations, BART officials disabled cell phone and internet access within most of the BART system by shutting down the antennas that enable reception in the underground stations."
Real progress – some lawyers may even know what the term means!
"Law Technology News is reporting that FOSS for large law firms and corporate counsel is starting to gain traction. There's a project called FreeEed, for the electronic discovery step in lawsuits, and there's software for the document page numbering process known as Bates stamping — affectionately called 'Bates Master' by the programmers. Are big law firms ready to accept open-source code?"
(Related) Access to raw data is good. Finding the needle in the haystack is better. Lexus and Westlaw still have value.
August 12, 2011
Members of the Free Access to Law Movement (FALM)
"There is now a website listing the 40 members of the Free Access to Law Movement, with links to their websites and links to the Declaration on Free Access to Law in 17 languages or scripts." [Graham Greenleaf AM, Professor of Law & Information Systems, University of New South Wales (UNSW)]
For my Ethical Hackers: Calculate how long it will take to crack any password...
August 12, 2011
Writing and Maintaining Secure Online Passwords
"Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose, is discovered.
If every possible password is tried, sooner or later yours will be found. The question is: Will that be too soon...or enough later? This interactive brute force search space calculator allows you to experiment with password length and composition to develop an accurate and quantified sense for the safety of using passwords that can only be found through exhaustive search. Please see the discussion below for additional information."
Information wants to be free?
Peer review in scientific publications
August 12, 2011 16:58 Source: UK House of Commons (Science and Technology Committee)
From the website:
The Science and Technology Committee today concludes that in order to allow others to repeat and build on experiments, researchers should aim for the gold standard of making their data fully disclosed and made publicly available.
+ Direct link to the report (HTML)
For all my students (although I disagree with rule 6)
7 Netiquette Guidelines For Writing Emails & Forum Posts
Netiquette is short for network or internet etiquette. It encompasses the special set of social conventions found in online interactions. While netiquette rules are very similar to good behavior or etiquette in offline encounters, there are subtle differences that can easily make or break a good impression.
(Related) On the other hand, perhaps I can use this to ensure I am sufficiently rude?
Use Tone Check To Keep Your Emails Friendly & Free of Rudeness