Adam Grant, Wharton professor, writes a thoughtful essay on plagiarism (worth reading in its entirety) and concludes with a suggested rule:
If you use a full sentence or more from an email that someone else wrote, quote it and attribute it to that person. Otherwise, take the high road and rewrite it from scratch in your own words.
via Is It Wrong to Plagiarize From an Email? – Promising Practices – Management – GovExec.com.
Carolyn Elefant has a good tip:
If you are hiring a developer to create a mobile responsive page, it is important to view the site on desktop, tablet and phone. Not only may you discover that the text runs together on the smaller screen but it may also not align properly on a desktop.
via Make Sure Your Website is Mobile Responsive – Lawyers and Law Service – My Shingle.
A front page New York Times story indicates even prestigious law firms are not immune to clueless behavior:
Four men, who were charged by New York prosecutors on Thursday with orchestrating a nearly four-year scheme to manipulate the firm’s books to keep it afloat during the financial crisis, talked openly in emails about “fake income,” “accounting tricks” and their ability to fool the firm’s “clueless auditor,” the prosecutors said.
Dumb, dumb, dumb. Don’t engage in conduct like this, and if you must, show some common sense.
Kevin O’Keefe makes a great point about the powerful self-corrective nature of social media:
Traditional legal publishers are quick to question the reliability of information from blogs and Twitter.
How do you know if the blog post is correct? Is the blogger authoritative? Anyone can jump on Twitter and start to Tweet. Look at all the false information that’s tweeted during breaking news.
There’s almost a smugness I get when I discuss the value of social media with traditional publishers. They’re just blogs. It’s just Twitter. It can be be just a lot of noise coming at you.
As Bailey points out, many overlook the fact that the aggregate data can often give the most accurate lens by which information can be confirmed.
What’s more reliable? One legal reporter calling a source or two and getting out a story the next day or five or ten lawyers blogging on the legal development that day with comments and Tweets commenting on the blog posts.
via Legal social media trumps traditional reporting and peer review.
The ever-sensible Jim Calloway doesn’t want us to wind up with a big April Fool’s cap on our heads:
So for those of you who have used XP all these years, avoiding the pain of the Vista and the first release of Windows 8, why would I call you a fool for keeping on keeping on? Because the end of support means no security upgrades and many of us, including Microsoft, are predicting a huge malware spike in the days following April 8. It really makes sense, doesn’t it? A malware designer who has developed some atrocious thing to steal credit card numbers, hijack your computer or just make it inoperable who releases it now would likely be stymied by a patch or fix released by Microsoft the very next “Patch Tuesday.” But after April 8, it will be clear sailing.
via Lawyers, Don’t be an April Fool for Windows XP – Jim Calloway’s Law Practice Tips Blog.
There are multiple smartphone contenders in the market, including:
- BlackBerry 10 from Blackberry (fka Research in Motion)
- Windows Phone8 from Microsoft
- iOS 7 from Apple
- Android 4.x from Google
Who better than Nerino Petro to guide us through the pros and cons? One key insight:
Ultimately, the decision may come down to who your current cell phone provider is and which phones fit your budget. Apple has introduced a lower-cost model of its iPhone 5, the iPhone 5C, to reach a broader audience. Google introduced its own smart phones that are designed to its specifications and run stock Android with the guarantee of getting the latest Android updates, such as the Nexus 5, as soon as they’re available.
Many websites, including banks, have gone to the practice of allowing users who have lost passwords to obtain access to their accounts through the use of “secret questions.” For years the classic secret question was “Mother’s Maiden Name.” Though there is now more variety in secret questions, they still represent a giant security flaw. Security guru Bruce Schneier has written many times about this issue.
Serious attackers will often be able to figure out the answers by researching the subject–especially subjects who are indiscreet users of social media. Close friends or relatives inclined to access your accounts may not even have to do all that much research. They may already know the brand of your first car, or the name of your favorite elementary school teacher. At a minimum, protect yourself by never giving a real answer when you set up a “secret question.”
Why do banks like to use such insecure techniques? From their point of view, it’s better than having to deal with an angry customer who has lost his password. Any losses the practice may cause are an “externality,” a cost not born by the bank.
At iPhone J.D. the ever-helpful Jeff Richardson explains an app to allow access to PACER on the iPad and iPhone.
Jim Calloway likes Google’s Chrome web browser and devotes a column to resources to help lawyers make the switch.
Baffled by Bitcoin? Bob Ambrogi and J. Craig Williams are joined by two distinguished guest experts in a podcast:
The Legal Issues Surrounding Bitcoin
My quick take? The investment angle looks like a Dutch tulips experience in its early stages. The funds transfer mechanism? Maybe.