Search for: "Kevin Hacker" Results 101 - 120 of 208
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 Jul 2012, 5:57 am by Rob Robinson
http://bit.ly/LS4LDw (Michael Hamilton) Squeaky Kleen | Millnet - http://bit.ly/Q1PNj4 - (Charles Holloway) Technology-Assisted Review Boosted in TREC 2011 Results - http://bit.ly/LWkd1n (Evan Koblentz) The Importance of Review Management Expertise - http://bit.ly/OCvYK1 (Kevin Chang) The Lawyers Are Ready! [read post]
7 Jul 2012, 7:04 pm by Tom Goldstein
 It does not work; our tremendous Deputy Manager Max Mallory has spent months augmenting our capacity, and the hackers give up after a few minutes. [read post]
19 Mar 2012, 3:59 pm by SO Issues
[name withheld], 29, of Menasha, was not predisposed to having sexual contact with a child, his attorney, Kevin Musolf, maintained in arguing his client was entrapped. [read post]
14 Mar 2012, 7:57 am by Rob Robinson
 bit.ly/w1SJQU (Wystan Ackerman) Contract Can Lie in Email Threads or Multiple Emails – http://bit.ly/zfthhS (Chris Dale) Court Imposes Sanctions for Failure to Conduct Reasonable Inquiry and Late Production - bit.ly/wSyM5K (K&L Gates) Defending Sensitive Electronic Information From Hacker Attacks - bit.ly/wBX5q2 (Paul Stanfield, Will Ambruzs) ‘Do Not Track’ — Online Privacy Litigation Now and in the Future… [read post]
8 Feb 2012, 7:39 am by Rob Robinson
EchoStar: First Department Analyzes When Duty to Preserve Evidence is Triggered – bit.ly/vZOPF2 (Kevin Broughel, James Worthington) What Causes Lawyers to Over-Preserve? [read post]
19 Jan 2012, 4:23 pm by Kim Zetter
Kevin Hemsley, a senior security analyst for the DHS’s Industrial Control System Computer Emergency Response Team and who was present at the conference, raised the issue that Wightman and his group hadn’t disclosed the vulnerabilities to the vendors in advance of his talk so that they could be prepared with patches or mitigation techniques. [read post]
11 Jan 2012, 8:00 am by Rob Robinson
Federal Prosecutor Battles Botnets, Catches Phishers - bit.ly/yDTpAy (Christian Nolan) Defendants Not Required to Share Costs for Plaintiff’s Third Party Request - bit.ly/xkB5Gg (Doug Austin) District of Delaware Revises Default Standard for Discovery of Electronically Stored Information - bit.ly/wMsb6e (Francis Pileggi) E-Discovery: 2011 Year in Review with Monica Bay and Cecil Lynn (Podcast) bit.ly/yVDemz (Legal Talk Network) E-Discovery: Mind Your P’s and Q’s - bit.ly/w7i1ej… [read post]
9 Jan 2012, 11:12 am by Katie Porter
I edited the volume, and chapter contributors are many Credit Slips regulars or guest bloggers--Jacob Hacker, Bob Lawless, Kevin Leicht, Angela Littwin, Deborah Thorne, and Elizabeth Warren--along with other top scholars. [read post]
28 Nov 2011, 1:36 pm by Kim Zetter
” “I can’t imagine a juror who wants to have a future in the military … going against the statement of [guilty] made by his or her commander-in-chief,” said Kevin Zeese, a legal advisor to the Bradley Manning Support Network. [read post]
22 Nov 2011, 10:27 am by Kim Zetter
Manning was arrested in May 2010 in Iraq after allegedly telling a former hacker that he had leaked vast amounts of classified material to WikiLeaks. [read post]
10 Nov 2011, 3:15 pm by Joe Palazzolo
Kevin Bankston, a senior staff attorney at the Electronic Frontier Foundation, which is representing one of the Twitter account holders, told CNET his group is “considering our options for how best to protect our clients’ rights in response to this dangerous decision. [read post]
9 Nov 2011, 5:48 am by Rob Robinson
http://bit.ly/uLDr9H (Jeff Orloff) iCloud + Outlook Equals IT Headache - http://bit.ly/ssBsrV (Ed Hansberry) Information Governance: The Proactive Approach - http://bit.ly/tUUdik (Joshua Kunkle) Inside Exchange -The Offline Address Book - http://bit.ly/rSeZXi (Casper Manes) Lessons Email Administrators Can Learn from ‘Hollywood Hacker’ Bust - http://bit.ly/uE3z7D (John Mello) Litis Consulting Launches ESI Discovery Services - http://bit.ly/u2tBWF (Legal IT Professionals) Live… [read post]
4 Nov 2011, 1:58 am by LindaMBeale
" (That sentence is illustrated with a great chart, with data drawn from Joseph Hacker of Yale and Paul Pierson of Berkeley, the authors of Winner-Take-All Politics, a book I highly recommend.) [read post]
28 Oct 2011, 12:51 pm by Kim Zetter
LONG BEACH, CA — If the government really wants to protect the nation’s electrical grid and critical infrastructure from hackers and other attackers, it’s got to change the way it communicates with the people in charge of securing those systems. [read post]
21 Oct 2011, 3:58 am by Broc Romanek
Kevin McCarthy - HR 2930, the Entrepreneur Access to Capital Act, introduced by Rep. [read post]
19 Oct 2011, 4:40 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
19 Oct 2011, 4:40 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
18 Oct 2011, 12:18 pm by Beth Taylor
" Security consultant Aviv warned that today's technology makes cyber-theft relatively easy for hackers, from individuals looking to empty checking accounts to business competitors seeking trade secrets to governments hacking into other nations' confidential data. [read post]
12 Oct 2011, 4:59 am by Rob Robinson
http://bit.ly/q1UD5l (Fulbright) Socially Aware: The Social Media Law Update (PDF) http://bit.ly/mQIDCt (Morrison & Foerster) Six Provocations for Big Data – http://bit.ly/nZh1pb (Danah Boyd, Kate Crawford) The History of Digital #Storage [INFOGRAPHIC] http://on.mash.to/purTmv (Matt Silverman) The Sequence and Chronology of Meet and Confer – http://bit.ly/p2OPlS (Orange Legal Technologies) Tracking the Trackers: Where Everybody Knows Your Username – http://bit.ly/okutPE… [read post]
11 Oct 2011, 11:01 am by Kim Zetter
With previous reporting by Kevin Poulsen See Also: Documents: FBI Spyware Has Been Snaring Extortionists, Hackers … Get Your FBI Spyware Documents Here FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats FBI Spyware: How Does the CIPAV Work? [read post]