ABA TECHSHOW.blogThe Latest Information About ABA TECHSHOW - The World's Premier Legal Technology ConferenceWiFi vs Cellular Access- June 23, 2006 There is a lot of hype about the availability of WiFi but the fact is that there is not enough coverage, free or otherwise, to count on it being there in a pinch. More...http://www.techshow.com/blog/062306.html Wheres the Money Honey- June 20, 2006 Once a month lawyers should take a financial snapshot of their practice. The main purpose of is to give lawyers a clear picture, on a monthly basis, of where the money is. More...http://www.techshow.com/blog/062006.html FBI Survey: 90% of Companies Had Sucurity Incident in 2005- June 16, 2006 According to the 2005 FBI Computer Crime Survey, nine out of ten companies had a computer security incident in 2005. In a survey of over 2,000 businesses, one out of five reported being the victim of 20 or more attacks. More...http://www.techshow.com/blog/061606.html ABA TECHSHOW 2007 -- Save The Date- June 12, 2006 It's official -- ABA TECHSHOW 2007 will be held March 22 through 24, 2007, at the Sheraton Chicago Hotel and Towers. Mark your calendars now, and check back here regularly for updates and new information about the show.http://www.techshow.com/blog/061206.html Google's Desktop 3 Raises Privacy Concerns- June 6, 2006 On February 9th, search engine giant Google unveiled a new desktop search tool that accesses more private records than ever for those who choose to use it. Google Desktop 3, the latest version of software that helps users find files on personal computers, has a new feature that can track data from multiple PCs. More...http://www.techshow.com/blog/060606.html Businesses Not Negligent for Bypassing Encryption- June 2, 2006 On February 8th, Minnesota U.S. District Court Judge Richard Kyle dismissed a suit filed by Stacy Lawton Guin, a customer of Brazos Higher Education Service, who had sued the corporation on the grounds that encryption should be used as a routine security precaution. The judge found that Brazos had a written security policy and other "proper safeguards" for customers' information and that it acted with reasonable care even without encrypting the database. The case arose as a result of a burglary.http://www.techshow.com/blog/060206.html |