« July 27, 2008 - August 2, 2008 | Main | August 10, 2008 - August 16, 2008 »

10 Tech Books Recommended by Steven Levy

Steven Levy, author of Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age (2001), picks his top 10 tech books in the July issue of IEEE Spectrum. [JH]

August 8, 2008 in Announcements | Permalink | Comments (0) | TrackBack

New Accident Attorney Blogs

Maryland Accident Attorney Blog
http://www.marylandaccidentattorneyblog.com
http://www.marylandaccidentattorneyblog.com/index.xml

Covers Maryland injury law including news, events, and recent changes in the State of Maryland. Published by the Maryland accident attorneys at the legal firm of Silverman, Thompson, Slutkin, & White.

Georgia Truck Accident Attorney Lawyer
http://www.georgiatruckaccidentattorneyblog.com
http://www.georgiatruckaccidentattorneyblog.com/index.xml

Covers trucking accident law in the State of Georgia, including news, and recent updates to law. Published by Atlanta trucking accident lawyer Ken Shigley.

Traffic Accident News And Advice Blog
http://www.trafficaccidentnewsandadviceblog.com/
http://www.trafficaccidentnewsandadviceblog.com/index.xml

Traffic Accident Injury Lawyer John Bisnar discusses California traffic laws and traffic accidents.

August 8, 2008 in Legal Practitioner Blogging | Permalink | Comments (0) | TrackBack

Do You Want a Widgenie?

Not quite “the all-powerful data visualizer" Widgenie claims to be, Mike Gunderlay notes that Widgenie's "process is terribly simple, and the resulting charts are attractive." Read his review on Web Worker Daily, Widgenie Helps Visualize Data, and watch the service for some forthcoming features. [JH]

August 7, 2008 in Web Development | Permalink | Comments (0) | TrackBack

On Getting Real

Getting Real is a book about launching web apps without all the BS that can stall them. One caveat, while providing plenty of useful tips for creating web apps you want to create, creating web apps for clients is a totally different story. If you have to answer to clients, some of the offered advice simply won't work. [JH]

Read Getting Real Online: Free | Buy PDF: $19 | Buy Paperback: $25.00

August 7, 2008 in Announcements | Permalink | Comments (0) | TrackBack

Technology in Legal Education

To help legal educators locate materials that inform and enrich their teaching and writing, Nova Southwestern law prof Pearl Goldman offers an annotated bibliography of articles, commentaries, conference papers, essays, books, and book chapters that examine the impact of technology on legal education in this 100-plus page article (pdf) The article was published in the Summer 2008 issue of Law Library Journal. [JH]

August 6, 2008 in Technology, Curriculum_ | Permalink | Comments (0) | TrackBack

First Malware Attack to Target Twitter Users Reported

The BBC is reporting what is believed to be the first attack to target Twitter. A fake Twitter profile with a malicious payload has been spotted by Kaspersky. Kaspersky Lab is also reporting that a new worm is spreading via Facebook and MySpace. Details on the Kaspersky site.  Earlier this year, Kaspersky Lab predicted that we'd see an increase in cybercriminals exploiting social networks. [JH]

August 6, 2008 in Social Media | Permalink | Comments (0) | TrackBack

Google Locks Up Legitimate Blogger Blogs After Misidentifying Them as Splogs

Juan Carlos Perez reports in Google Mislabels Blogger Sites as Splogs, Locks Them, that Google mistakenly flagged a number of legitimate Blogger sites in an attempt to rid its Blogger service from spam blogs, or splogs last week, prompting the company to scramble to unlock them. "Google's actions to clean up the Blogger platform no doubt respond to its broad misuse by scammers and malicious hackers to link to or distribute malware."

StopBadware.org's May 2008 Badware Websites Report, identified the 10 network blocks that contain the largest number of malware sites. Scammers' exploit of Blogger made Google the fifth-largest malware-infected network in the world in May, and the largest US network. More about the Blogger platform being used by scammers and malicious hackers to link to or distribute malware at Are You Using Blogger?

August 5, 2008 in Blogosphere | Permalink | Comments (1) | TrackBack

What are the social media applications you use the most?

Top applications used by survey respondents included Friendfeed, Facebook, Myspace, LinkedIn and Google Reader. Check out the results of Michael Fruchter's recent survey on FriendFeed. See also his recent blog post: Staying Active in Social Media. [JH]

August 5, 2008 in Social Media | Permalink | Comments (0) | TrackBack

Malwebolence: On the Post-Usenet Troll Phenomenon

See Mattathias Schwartz's recent New York Times Sunday Magazine feature, Malwebolence - The Trolls Among Us, and Virginia Heffernan's New York Times post on The Medium. [JH]

August 4, 2008 in Social Media | Permalink | Comments (0) | TrackBack

The Blog Council Releases Disclosure Best Practices Toolkit

The Blog Council has released its Disclosure Best Practices Toolkit. The Toolkit is a draft series of checklists to help companies, their employees, and their agencies learn the appropriate and transparent ways to interact with blogs, bloggers, and the people who interact with them. Topics covered include:

[JH]

August 4, 2008 in Announcements | Permalink | Comments (0) | TrackBack