2016
#AI, #VR, and #IoT Are Coming to a Courthouse Near You!
The Judges’ Journal technology columnist proposes examples of Artificial Intelligence (AI), Virtual Reality (VR), and the Internet of Things (IoT) that may find their way into your courthouse in the near future.
Telephone Technology versus the Fourth Amendment
Judge Dixon reviews that which he considers a never-ending battle between the advancement of telephone technologies and the extent of the protection provided by the Fourth Amendment of the U.S. Constitution.
2015
Technology and the Future of Legal Services
The ABA Commission on the Future of Legal Services has generated much discussion about ways to address the huge market of unmet legal needs. This column explores some technology possibilities for consideration by the Commission.
The End of Privacy as We Know It?
Judge Dixon discusses from the perspective of the pessimist, optimist, and pragmatist the results of a Pew Research Center survey that asked experts what the public’s view and expectation of privacy will be in the next 10 years.
Technological Advancements Coexisting with Tech Stagnation
Judge Dixon updates technology advances discussed in three previous columns and stresses a particular concern he has about failures in cyber security defenses.
2014
Technology Changes Coming Faster and Faster
The Judges’ Journal technology columnist introduces this special technology issue by commenting on the resistance of some to the intrusion of technology into their professional lives, the need for members of the profession to be aware of the ethical obligations resulting from the use of technology, and the need to keep abreast of advancements.
Technology and the Law 50 Years Ago
In recognition of the 50th anniversary of the Appellate Judges Conference, Judge Dixon compares aspects of appellate and trial practice of 50 years ago with the practice today and reviews a few predictions made in 1964 of what the world would be like in 2014.
Worst Passwords of 2013: password & 123456
After seeing a compilation of 2013’s worst passwords, Judge Herbert Dixon revisits the issue of cybersecurity to remind readers of the importance of creating strong passwords for online accounts to avoid becoming a cyber-victim and suffering financial, data, or privacy losses.
Scientific Fact or Junk Science? Tracking a Cell Phone without GPS
Increasingly, competing experts are offering opposing opinions on the reliability of determining the approximate location of a cell phone. In this article, Judge Dixon highlights the significant arguments by both sides and discusses the technology on which these arguments are based.
2013
Information Technology Disaster Recovery Planning for Court Institutions
The creation and development of an Information Technology Disaster Recovery Plan for a court is an extremely complex, detailed, and technical process. Judge Dixon outlines some of the considerations that must be a part of any court’s effort to effectively develop such a plan.
Technology and the Courts: A Futurist View
Judge Dixon takes stock of the increasing use of technology in court and litigation practices and offers his predictions of court technology developments in the near and distant future.
iPad Wizardry for Beginners
Judge Dixon provides a narrative step-by-step description of some iPad basics for beginners and others who are in the learning or get-acquainted process with their iPads. He also requests feedback from readers on the desirability of an occasional technology column geared toward beginners.
Human Trafficking and the Internet* (*and Other Technologies, too)
Judge Dixon reports on instances in which human trafficking is both facilitated and combatted by the Internet and other technologies. In addition, he discusses the efforts of academia and private industry to expand the use of technology to disrupt and combat human trafficking.
2012
Cybersecurity...How Important Is It?
Judge Dixon discusses the importance of cybersecurity as a priority of the United States and the American Bar Association, tells the story of a prominent technology writer who was the victim of malicious computer hacking, and gives practical suggestions of steps people can take to strengthen their defenses to a cyber attack.
Automating the Search and Review of ESI
With the huge increase in records that are stored and maintained electronically, some storage units amount to billions of pages. Computer-assisted review may afford a solution to the skyrocketing costs of discovery by making it easy to search for relevant electronic documents. These new technologies offer hope of some savings from the cost of human page-by-page review and the possibility of increased accuracy.
Cloud Computing
The movement toward cloud computing, which allows users to access programs and files over the Internet, is undeniable. The costs are now within everyone’s economic reach, with basic services being free in many instances. The author lists several well-known cloud storage and file management service companies and offers words of caution in case those companies go out of business or experience technical problems.
Giving a Wireless iPad Presentation: Where Perfect Is the Enemy of Good
There is a certain thrill to walking around with an iPad making a wireless presentation—even if the necessary extra equipment required is a nuisance.