Blogs

Jun
08

This month marks a milestone for the world of autonomous vehicles. Virginia announced June 1 that the Virginia Tech Transportation Institute, in partnership with the Virginia DOT and several other entities, has established the “Virginia Automated Corridors.” The corridors comprise over seventy miles of roads in Northern Virginia, including several interstates and state roads. According

Jun
01

A recent trend in law firm server hacking is something called Ransomware. Ransomware “is a type of malware that prevents or limits users from accessing their system. Once infected the malware will lock the user out of their data, or hide the data until the user pays a ransom to get access back. Some of

May
27

Cindy Garcia v. Google, Inc. is a case that brought forward many questions about the definition of a copyright, and for a brief moment tried to change that definition. The plaintiff in this case was hired to be an actress in a film entitled “Desert Warrior,” but instead had her performance used and her lines

May
18

The advancement of global positioning system (GPS) technology has made tracking individuals’ locations increasingly easier.  Many mobile applications (“apps”), such as Find My iPhone, GPS Location Tracker, and Find My Friends, allow parties to keep track of other individual’s locations.  These applications can be very helpful in aiding individuals to find their lost phones or

May
04

In the past, the federal government proposed a national hike to the minimum wage, from $7.25 to $10.10, a 40% increase. More recently, Democratic lawmakers have proposed legislation to increase federal pay by 66% to $12 an hour by 2020. This would exceed the minimum wage of all states. The proposal would also gradually eliminate

Apr
15

Suffixes of web domain names are sometimes used to give negative feedback for certain companies.  For example, “.fail” and “.gripe” are two that are live on the internet currently, and someone pay purchase a domain name with a company she does not like with one of these suffixes, as long as the domain name has

Apr
13

Stingrays are powerful surveillance tools that government agencies have been using for at least several years. Roughly the size of a small suitcase, Stingrays work by mimicking the operation of a cell tower. Unbeknownst to the user, a Stingray can convince a cell phone that it is a legitimate cell tower, receiving all of the

Apr
03

Have you ever tried to visit a site online and received an error message saying that the website you’re trying to access isn’t trusted? Well, that is about to happen more frequently thanks to the recent fall-out between Google and the China Internet Network Information Center (“CNNIC”). Google recently announced that it will no longer

Apr
02

Any good lawyer joke will tell you that the legal profession is facing its share of ethical hurdles, and the rise of social media lumps on a new set of challenges. Facebook, Twitter, LinkedIn, and Snapchat have become some of the largest web-based companies in the market over the last several years. These massive social

Categories