Anna Irvin, Ph.D. and Janice E. Henderson, Esq. presented this comprehensive 64 page guide at the LLAGNY Education Committee Program on October 15, 2019. The guide is an multidisciplinary resource that includes: articles from law, business and finance journals, CLE programs/materials, smart contracts, Westlaw and Practical Law citations, sources on the impact of blockchain on the U.S. government and the international regulatory landscape, as well as all states with blockchain and cybersecurity laws (introduced, pending and failed).
Earlier this year Ron Friedmann presented an interactive session on how law firm libraries can create new value, at the Ark conference Best Practices & Management Strategies for Law Firm Library, Research & Information Services (aka Ark Library). In this article he shares some session highlights, the voting results of the interactive portion, his slides and and a link to his live presentation.
Tech savant, innovator and prognosticator – Jason Voiovich: “How many times in #marketing, #innovation, and #product strategy do we find ourselves looking only at the upside? In our TAM calculations, how often do we subtract out the “negative market” to account for risks? I’ve been doing this for nearly 25 years, and I never did. I suspect you haven’t either. I’m not sure I would have seen this as an obvious next step had I not spent the last year exploring the dark side of #platform strategies from Amazon, Google, Facebook, and Twitter. It’s time to look at these business models holistically. “
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Medicare fraud, identity theft: Genetic testing scams target seniors; NIST Publishes Multifactor Authentication Practice Guide; “You Can Probably Be Identified From Your Anonymized Data”; and CIS Releases Newsletter on Cleaning Up Data and Devices.
It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.
Marcus Zillman’s guide highlights multifaceted browser alternatives to mainstream search tools that researchers may regularly use by default. There are many reliable yet underutilized applications that facilitate access to and discovery of subject matter specific documents and sources. Free applications included here also offer collaboration tools, resources to build and manage repositories, to employ data visualization, to create and apply metadata management, citations, bibliographies, document discovery and data relationship analysis.
Pete Weiss is the author of Pete Recommends – Weekly highlights on cyber security. He is a strong advocate of RSS to keep pace with rapidly changing updates in the news, research and technology to name but a few subjects. Using Sabrina Pacifici’s blog, beSpacific, as an example, Weiss offers more than a dozen regularly updated subject matter specific feeds that you should consider adding to your research portfolio.
Former CPA, writer and teacher Ken Boyd provides readers with an explanation of tax fraud that is clearly presented, instructive and relevant to the ongoing Mueller investigation. Boyd uses the extensive New York Times investigative report of November 2018 that documented a history of tax fraud allegedly committed by Donald Trump, his father and siblings, as the foundation for his lesson on various types of tax fraud. The allegations documented by the Times are under review by the New York State Department of Taxation and Finance.
How big is the Deep Web? It is estimated to comprise 7,500 terabytes – although an exact size is not known, and the figures vary widely on this question. The magnitude, complexity and siloed nature of the Deep Web is a challenge for researchers. You cannot turn to one specific guide or one search engine to effectively access the vast range of information, data, files and communications that comprise it. The ubiquitous search engines index, manage and deliver results from the Surface web. These search results include links, data, information, reports, news, subject matter content and a large volume of advertising that is optimized to increase traffic to specific sites and support marketing and revenue focused objectives. On the other hand, the Deep Web – which is often misconstrued as a repository of dark and disreputable information [Note – it is not the Dark Web], has grown tremendously beyond that characterization to include significant content on a wide range of subject matters covering a broad swath of files and formats, databases, pay-walled content as well as communications and web traffic that is not otherwise accessible through the surface Web. This comprehensive multifaceted guide by Marcus Zillman providers you with an abundance of resources to learn about, search, apply appropriate privacy protections, and maximize your time and efforts to conduct effective and actionable research within the Deep Web.
Christopher Kenneally interviewed Marcy Phelps on his Copyright Clearance Center’s podcast series, Beyond the Book. A licensed private eye who earned her master’s degree in library and information science from the University of Denver, Marcy Phelps works for asset management firms, commodity pool operators, M&A professionals, and others. Her detective work combing through databases and other online data dumps helps build a definitive dossier documenting any litigation, bankruptcies, and regulatory actions that could raise unpleasant questions for investors and even uncover unsavory characters.