Blogs

Feb
10

The ideas, views, and opinions contained in this article belong solely to the author and are not representative of the views of any organization the author is associated with. Reports have emerged from sites like Reddit about e-cigarettes infecting computers with malware. Malware is any software used to disrupt computer operation, gather sensitive information, or

Feb
10

The American war on drugs has a well-documented track record of disproportionately impacting racial minorities and the poor. That’s why the arrest, trial, and conviction of a man who called himself “The Dread Pirate Roberts,” a reference to the 1987 movie The Princess Bride, is noteworthy. Ross Ulbricht now stands convicted of federal money laundering,

Feb
09

In an evolving world where people use technology to communicate more and more, the legal world has to make changes to keep up. For instance, text messaging and online chatting are becoming main forms of communication for many people, which are both much different than face-to-face communication because you cannot hear the tone of the

Feb
09

Radio frequency identification and microchips have become much more accessible and prominent in everyday life. Whether it’s to keep people from stealing in stores, or to locate the home of a lost pet, RFID chips have a wide range of use. However, some people in the technology world believe that microchips are about to become

Feb
05

As we venture into the future of the legal profession, we encounter an increase in the use of technology. The real issue this raises is whether law students are being prepared to enter this ever-changing field. While the value of textbooks can never be questioned, the reality is that once in practical world, the likelihood

Feb
04

“Cybersecurity” is quickly becoming the buzzword of our generation. It appears in national headlines, legislative schedules, and now President Obama’s 2015 agenda. In response to recent cyber attacks on multiple U.S. companies and the federal government itself, President Obama has made cybersecurity a top priority for 2015. On Monday, February 2, President Obama set into

Feb
04

For years, many have posited that the death of the traditional television service provider is just around the corner. However, as those years have gone by, the likes of Comcast and DirecTV have done absolutely fine and even increased their customer base. The predictions of doom and gloom were largely attributable to the emergence and

Feb
03

After launching its high-speed, affordable broadband network in Kansas City, KS, Austin, TX, and Provo, UT, Google announced that it is expanding Google Fiber into four new metro areas—Atlanta, GA, Charlotte, NC, Nashville, TN and Raleigh-Durham, NC—and is also considering expansion into five other cities. While Google is not the first entity to build a

Feb
03

Social media has always been about the open exchange of information and ideas in virtual networks and communities. Social media is used to bring people together from disparate areas with common interests in an exchange of information. By bringing people together and creating communities, social media has served to improve our ability to communicate and

Categories