Research

Cable Lobby Tries To Stop State Investigations Into Slow Broadband

Slashdot: Your Rights Online - Mon, 06/19/2017 - 20:45
An anonymous reader quotes a report from Ars Technica: Broadband industry lobby groups want to stop individual states from investigating the speed claims made by Internet service providers, and they are citing the Federal Communications Commission's net neutrality rules in their effort to hinder the state-level actions. The industry attempt to undercut state investigations comes a few months after New York Attorney General Eric Schneiderman filed a lawsuit against Charter and its Time Warner Cable (TWC) subsidiary that claims the ISP defrauded and misled New Yorkers by promising Internet speeds the company knew it could not deliver. NCTA-The Internet & Television Association and USTelecom, lobby groups for the cable and telecom industries, last month petitioned the Federal Communications Commission for a declaratory ruling that would help ISPs defend themselves against state-level investigations. The FCC should declare that advertisements of speeds "up to" a certain level of megabits per second are consistent with federal law as long as ISPs meet their disclosure obligations under the net neutrality rules, the groups said. There should be a national standard enforced by the FCC instead of a state-by-state "patchwork of inconsistent requirements," they argue. Another cable lobby group, the American Cable Association (ACA), asked the FCC to approve the petition in a filing on Friday. An FCC ruling in favor of the petition wouldn't completely prevent states from filing lawsuits, but such a ruling would make it far more difficult for the states to protect consumers from false speed claims.

Read more of this story at Slashdot.

Categories: Research

Plastic emissions from world’s rivers add 5,000 metric tons of plastic waste every day to oceans

beSpacific - Mon, 06/19/2017 - 20:15

River plastic emissions to the world’s oceans, Laurent C. M. Lebreton, Joost van der Zwet, Jan-Willem Damsteeg, Boyan Slat, Anthony Andrady & Julia Reisser. Nature Communications 8, Article number: 15611 (2017). doi:10.1038/ncomms15611. Received: 27 October 2016. Accepted: 11 April 2017. Published online: 07 June 2017.

“Plastics in the marine environment have become a major concern because of their persistence at sea, and adverse consequences to marine life and potentially human health. Implementing mitigation strategies requires an understanding and quantification of marine plastic sources, taking spatial and temporal variability into account. Here we present a global model of plastic inputs from rivers into oceans based on waste management, population density and hydrological information. Our model is calibrated against measurements available in the literature. We estimate that between 1.15 and 2.41 million tonnes of plastic waste currently enters the ocean every year from rivers, with over 74% of emissions occurring between May and October. The top 20 polluting rivers, mostly located in Asia, account for 67% of the global total. The findings of this study provide baseline data for ocean plastic mass balance exercises, and assist in prioritizing future plastic debris monitoring and mitigation strategies.”

Categories: Research

California again tops list of states with worst air pollution

beSpacific - Mon, 06/19/2017 - 19:53

American Lung Association – State of the Air 2017 – “For 18 years, the American Lung Association has analyzed data from official air quality monitors to compile the “State of the Air” report. The more you learn about the air you breathe, the more you can protect your health and take steps to make our air cleaner and healthier.” [Washington DC received an F this year for Ozone Level – along with the statement – “If you live in Washington, DC, the air you breathe may put your health at risk.”

Categories: Research

Trooly background-check startup purchased by Airbnb

beSpacific - Mon, 06/19/2017 - 19:44

Bloomberg – Airbnb to Buy Background-Check Startup Trooly to Root Out Scams

  • Trooly delivers Instant Trust™ services that verify, screen and predict trustworthy relationships and interactions. We work with the world’s largest financial institutions, peer-to-peer marketplaces, marketers and employers. Our Instant Trust rating service is designed to fill a “trust gap” caused by the speed of modern commerce and community, which requires instant evaluation of potential reward and risk – without the trust-building interaction history and feedback loops that people use to evaluate relationships offline. Our machine learning technology synthesizes digital footprints in real time to provide rich insight — well beyond old-school background checks, credit scores and risk management tools…”
Categories: Research

GOP Data Firm Leaks Personal Data on 61 percent of US population

beSpacific - Mon, 06/19/2017 - 19:12

Gizmodo: “Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a publicly accessible Amazon server. The data leak contains a wealth of personal information on roughly 61 percent of the US population. Along with home addresses, birthdates, and phone numbers, the records include advanced sentiment analyses used by political groups to predict where individual voters fall on hot-button issues such as gun ownership, stem cell research, and the right to abortion, as well as suspected religious affiliation and ethnicity. The data was amassed from a variety of sources—from the banned subreddit r/fatpeoplehate to American Crossroads, the super PAC co-founded by former White House strategist Karl Rove. Deep Root Analytics, a conservative data firm that identifies audiences for political ads, confirmed ownership of the data to Gizmodo on Friday…”

Categories: Research

Shootings Now Third Leading Cause of Death for U.S. Children

beSpacific - Mon, 06/19/2017 - 18:59

Newsweek: “…Though we constantly see examples in the news, child gun injuries and deaths may be even more prevalent in the United States than we realized. A study published Monday in the journal Pediatrics showed that an average of 5,790 children in the United States receive emergency room treatment for gun-related injuries each year, and around 21 percent of those injuries are unintentional. The study also found that an average of 1,297 children die annually from gun-related injuries, making guns the third-leading cause of death for children in America (behind illnesses and unintentional injuries like drownings or car crashes). The number is based on data taken from 2012–2014 for children up to the age of 17…”

Categories: Research

NASA Image, Audio and Video Library

beSpacific - Mon, 06/19/2017 - 18:52

NASA content – images, audio, video, and computer files used in the rendition of 3-dimensional models, such as texture maps and polygon data in any format – generally are not copyrighted. You may use this material for educational or informational purposes, including photo collections, textbooks, public exhibits, computer graphical simulations and Internet Web pages. This general permission extends to personal Web pages. News outlets, schools, and text-book authors may use NASA content without needing explicit permission. NASA content used in a factual manner that does not imply endorsement may be used without needing explicit permission. NASA should be acknowledged as the source of the material. NASA occasionally uses copyrighted material by permission on its website. Those images will be marked copyright with the name of the copyright holder. NASA’s use does not convey any rights to others to use the same material. Those wishing to use copyrighted material must contact the copyright holder directly. NASA has extensive image and video galleries online, including historic images, current missions, astronomy pictures, and ways to search for NASA images. Generally, each mission and program has a video and image collection on the topic page. For example, space station videos can be found at https://www.nasa.gov/mission_pages/station/videos/index.html. Content can also be found on our extensive social media channels.”

Categories: Research

Equipment Already In Space Can Be Adapted For Extremely Secure Data Encryption

Slashdot: Your Rights Online - Mon, 06/19/2017 - 18:40
Orome1 quotes a report from Help Net Security: In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth. This is the first time that quantum states have been measured so carefully from so far away. A satellite-based quantum-based encryption network would provide an extremely secure way to encrypt data sent over long distances. Developing such a system in just five years is an extremely fast timeline since most satellites require around 10 years of development. For the experiments, the researchers worked closely with satellite telecommunications company Tesat-Spacecom GmbH and the German Space Administration. The German Space Administration previously contracted with Tesat-Spacecom on behalf of the German Ministry of Economics and Energy to develop an optical communications technology for satellites. This technology is now being used commercially in space by laser communication terminals onboard Copernicus -- the European Union's Earth Observation Program -- and by SpaceDataHighway, the European data relay satellite system. It turned out that this satellite optical communications technology works much like the quantum key distribution method developed at the Max Planck Institute. Thus, the researchers decided to see if it was possible to measure quantum states encoded in a laser beam sent from one of the satellites already in space. In 2015 and the beginning of 2016, the team made these measurements from a ground-based station at the Teide Observatory in Tenerife, Spain. They created quantum states in a range where the satellite normally does not operate and were able to make quantum-limited measurements from the ground. The findings have been published in the journal Optica.

Read more of this story at Slashdot.

Categories: Research

ABA’s Free Legal Answers Site

beSpacific - Mon, 06/19/2017 - 18:22

Free Legal Answers is a virtual legal advice clinic. Qualifying users post their civil legal question to their state’s website. Users will then be emailed when their question receives a response. Attorney volunteers, who must be authorized to provide pro bono assistance in their state, log in to the website, select questions to answer, and provide legal information and advice. Volunteer attorneys will not answer criminal law questions. Participating states have their own page where qualifying residents will post their question. Look at your state’s page for more information. Free Legal Answers is a project of the American Bar Association’s Standing Committee on Pro Bono and Public Service. If you would like more information about the Free Legal Answers site, contact the National Site Administrator here. Please be advised, the National Site Administrator will not respond to email requests for legal assistance.” Also, please consider law librarians’ who are located at public organizations.

Categories: Research

Supreme Court Rules Sex Offenders Can't Be Barred From Social Media

Slashdot: Your Rights Online - Mon, 06/19/2017 - 18:00
An anonymous reader quotes a report from Gizmodo: In a unanimous decision today, the Supreme Court struck down a North Carolina law that prevents sex offenders from posting on social media where children might be present, saying it "impermissibly restricts lawful speech." In doing so, the Supreme Court asserted what we all know to be true: Posting is essential to the survival of the republic. The court ruled that to "foreclose access to social media altogether is to prevent the user from engaging in the legitimate exercise of First Amendment rights." The court correctly noted that "one of the most important places to exchange views is cyberspace." The North Carolina law was ruled to be overly broad, barring "access to what for many are the principal sources for knowing current events, checking ads for employment, speaking and listening in the modern public square, and otherwise exploring the vast realms of human thought and knowledge."

Read more of this story at Slashdot.

Categories: Research

Offensive Trademarks Must Be Allowed, Rules Supreme Court

Slashdot: Your Rights Online - Mon, 06/19/2017 - 14:01
In a ruling that could have broad impact on how the First Amendment is applied in other trademark cases in future, the U.S. Supreme Court on Monday threw out a federal prohibition on disparaging trademarks as a constitutional violation in a ruling involving a band called The Slants. From a report: The opinion in Matal v. Tam means that Simon Tam, lead singer of an Asian-American rock band called "The Slants," will be able to trademark the name of his band. It's also relevant for a high-profile case involving the Washington Redskins, who were involved in litigation and at risk of being stripped of their trademark. The court unanimously held that a law on the books holding that a trademark can't "disparage... or bring... into contemp[t] or disrepute" any "persons, living or dead," violates the First Amendment. Tam headed to federal court years ago after he was unable to obtain a trademark. In 2015, the US Court of Appeals for the Federal Circuit ruled in Tam's favor, finding that the so-called "disparagement clause" of trademark law was unconstitutional.

Read more of this story at Slashdot.

Categories: Research

Using Texts as Lures, Government Spyware Targets Mexican Journalists and Their Families

Slashdot: Your Rights Online - Mon, 06/19/2017 - 12:40
Mexico's most prominent human rights lawyers, journalists and anti-corruption activists have been targeted by advanced spyware sold to the Mexican government on the condition that it be used only to investigate criminals and terrorists, reports the New York Times. From the report: The targets include lawyers looking into the mass disappearance of 43 students (alternative source), a highly respected academic who helped write anti-corruption legislation, two of Mexico's most influential journalists and an American representing victims of sexual abuse by the police. The spying even swept up family members, including a teenage boy. Since 2011, at least three Mexican federal agencies have purchased about $80 million worth of spyware created by an Israeli cyberarms manufacturer. The software, known as Pegasus, infiltrates smartphones to monitor every detail of a person's cellular life -- calls, texts, email, contacts and calendars. It can even use the microphone and camera on phones for surveillance, turning a target's smartphone into a personal bug.

Read more of this story at Slashdot.

Categories: Research

Lessons of 2016 for U.S. Election Security

Freedom to Tinker - Mon, 06/19/2017 - 11:22

The 2016 election was one of the most eventful in U.S. history. We will be debating its consequences for a long time. For those of us who pay attention to the security and reliability of elections, the 2016 election teaches some important lessons. I’ll review some of them in this post.

First, though, let’s review what has not changed. The level of election security varies considerably from place to place in the United States, depending on management, procedures, and of course technology choices. Places that rely on paperless voting systems, such as touchscreen voting machines that record votes directly in computer memories (so-called DREs), are at higher risk, because of the malleability of computer memory and the lack of an auditable record of the vote that was seen directly by the voter. Much better are systems such as precinct-count optical scan, in which the voter marks a paper ballot and feeds the ballot through an electronic scanner, and the ballot is collected in a ballot box as a record of the vote. The advantage of such a system is that a post-election audit that compares a random sample of paper ballots to the corresponding electronic records can verify with high confidence that the election results are consistent with what voters saw. Of course, you have to make the audit a routine post-election procedure.

Now, on to the lessons of 2016.

The first lesson is that nation-state adversaries may be more aggressive than we had thought. Russia took aggressive action in advance of the 2016 U.S. election, and showed signs of preparing for an attack that would disrupt or steal the election. Fortunately they did not carry out such an attack–although they did take other actions to influence the election. In the future, we will have to assume the presence of aggressive, highly capable nation-state adversaries, which we knew to be possible in principle before, but now seem more likely.

The second lesson is that we should be paying more attention to attacks that aim to undermine the legitimacy of an election rather than changing the election’s result. Election-stealing attacks have gotten most of the attention up to now–and we are still vulnerable to them in some places–but it appears that external threat actors may be more interested in attacking legitimacy.

Attacks on legitimacy could take several forms. An attacker could disrupt the operation of the election, for example, by corrupting voter registration databases so there is uncertainty about whether the correct people were allowed to vote. They could interfere with post-election tallying processes, so that incorrect results were reported–an attack that might have the intended effect even if the results were eventually corrected. Or the attacker might fabricate evidence of an attack, and release the false evidence after the election.

Legitimacy attacks could be easier to carry out than election-stealing attacks, as well. For one thing, a legitimacy attacker will typically want the attack to be discovered, although they might want to avoid having the culprit identified. By contrast, an election-stealing attack must avoid detection in order to succeed. (If detected, it might function as a legitimacy attack.)

The good news is that steps like adopting auditable paper ballots and conducting routine post-election audits are useful against both election-stealing and legitimacy attacks. If we have strong evidence of voter intent, this will make election-stealing harder, and it will make falsified evidence of election-stealing less plausible. But attacks that aim to disrupt the election process may require different types of defenses.

One thing is certain: election workers have a very difficult job, and they need all of the help they can get, from the best technology to the best procedures, if we are going to reach the level of security we need.

Categories: Research

198 Million Americans Hit By 'Largest Ever' Voter Records Leak

Slashdot: Your Rights Online - Mon, 06/19/2017 - 11:21
Political data gathered on more than 198 million US citizens was exposed this month after a marketing firm contracted by the Republican National Committee stored internal documents on a publicly accessible Amazon server, reports say. From a ZDNet article: It's believed to be the largest ever known exposure of voter information to date. The various databases containing 198 million records on American voters from all political parties were found stored on an open Amazon S3 storage server owned by a Republican data analytics firm, Deep Root Analytics. UpGuard cyber risk analyst Chris Vickery, who found the exposed server, verified the data. Through his responsible disclosure, the server was secured late last week, and prior to publication. This leak shines a spotlight on the Republicans' multi-million dollar effort to better target potential voters by utilizing big data. The move largely a response to the successes of the Barack Obama campaign in 2008, thought to have been the first data-driven campaign. Further reading: Republican Data-Mining Firm Exposed Personal Information for Virtually Every American Voter - The Intercept

Read more of this story at Slashdot.

Categories: Research

Today in OpenGov: What can we learn from President Trump’s financial disclosures?

Sunlight Foundation - Mon, 06/19/2017 - 07:14

On Friday, the Office of Government Ethics released President Trump's most recent financial disclosure documents. While not a substitute for the President's tax returns, this disclosure sheds some light on how winning the presidency has touched his assets and should help inform the public about his various business dealings.

Read on for more on Trump's financial disclosure and all the latest open government news from around the U.S. and across the globe. 

Disclosed
 
  • Numerous outlets are digging into the President's financial disclosure documents. Among other interesting details: Despite selling most of his stocks and stepping away from day-to-day management of his business, he is still benefiting from assets worth at least $1.4 billion; The properties he has visited most during his Presidency appear to be enjoying a boost in revenue; however, overall revenues from his businesses were down about 3 percent over the period covered in his previous filings.
  • Financial Disclosures don't paint the full picture. "The financial disclosure reports list Trump’s various assets, liabilities and some income, but it is difficult to determine a person’s wealth based on their financial disclosure forms because the values are listed in vast ranges." (The Hill) This is why we will continue to push for the President to release his full tax returns. 
elsewhere in Trumpland
The Center for American Progress
  • An interactive map of the Trump family's global conflicts of interest. "And there are equally telling signs that foreign leaders have deduced that giving Trump’s businesses special treatment is the quickest way to achieve gains for their country’s agenda at the White House." (Center for American Progress) Don't forget that Sunlight is also tracking Trump's conflicts of interest on a rolling basis. 
  • Meanwhile, in Middle East feud, Trump's agenda mirrors business ties. "Now a feud has broken out among these three crucial American allies, and Mr. Trump has thrown his weight firmly behind the two countries where he has business ties, raising new concerns about the appearance of a conflict between his public role and his financial incentives." (New York Times)
  • Vice President Pence picks outside counsel for Russia investigation. "Pence has hired Richard Cullen, the chairman of McGuireWoods in Richmond and a former US attorney with extensive experience handling government investigations, according to a spokesman for Pence." (BuzzFeed)
  • President and his lawyer seem to disagree about whether or not Trump is under investigation. "President Donald Trump is not under investigation by special counsel Robert Mueller, a member of his legal team said repeatedly Sunday morning." This despite a report in the Washington Post indicating that a probe had been widened "to also investigate whether Trump obstructed justice…" and a tweet from Trump himself that appeared to confirm the investigation. (POLITICO)
  • Will the new House Oversight Chairman use his investigative powers to probe president? "But there are signs that Gowdy, a former state and federal prosecutor who led the rancorous House probe into the 2012 Benghazi attacks, may defer those inquiries to other congressional investigations and to special counsel Robert S. Mueller III." (Washington Post)
washington watch
Georgia's 6th Congressional District
  • Inside the most expensive House race ever. "The contest [to fill a vacant House seat in the Atlanta Suburbs] now ranks as the most expensive U.S. House race in history. Including the money raised and spent leading up to April’s primary election, in which no candidate garnered a majority of the vote, roughly $60 million has been pumped into the race, according to an Issue One analysis of filings with the Federal Election Commission." (Issue One)
  • Center for Public Integrity sues FEC for email correspondence with Trump team. "The lawsuit, filed Wednesday with the U.S District Court for the District of Columbia, stems from the FEC’s refusal to make public emails between agency officials and the Office of Management and Budget during the initial days of President Donald Trump’s administration." (Center for Public Integrity)
  • Senators on both sides of aisle concerned about opaque healthcare bill. "Both Republican and Democratic senators are expressing concerns over the lack of open process in the Senate's work on a revised ObamaCare repeal-and-replace bill even as Republican leadership looks to move the bill to a vote as soon as possible." (The Hill)
  • Agencies insistence on "unnamed sources" restricts accountability. "Here’s what’s lost when people hide behind generic titles. Real accountability for people on the public payroll." (Star Tribune) Our take? Overuse of anonymous sources and "senior officials" whose agencies insist that they speak "on background" falls short of democracy at its best. When public servants don't go on the record to explain their policies and actions, transparency and accountability suffer.
around the world Reporter and author Javier Valdez Cárdenas was shot and killed in Culiacán, Sinaloa on May 15.
  • Palestinian Authority moves to censor critics online. "The Palestinian Authority's (PA) Attorney General issued a Directive for the dozen Palestinian ISPs operating in the West Bank to block 11 websites affiliated with political rivals and critics of President Mahmoud Abbas." (Global Voices)
  • Shedding light on the growing violence against journalists in Mexico. "When gunmen shot and killed Mexican columnist, investigative reporter, and author Javier Valdez Cárdenas in Culiacán, Sinaloa on May 15, a chill went through newsrooms everywhere. Not only was he the sixth member of the press in Mexico to be assassinated in less than three months, some reporters had just assumed that someone of Valdez’s international fame and stature would be protected." (The National Security Archive)
save the dates
 
  • June 27th: Legislative Data and Transparency Conference in Washington, DC. "The Legislative Data and Transparency Conference 2017 (#LDTC17), hosted by the Committee on House Administration, will take place on Tuesday, June 27, 2017in the Capitol Visitor Center Congressional Auditorium. The #LDTC17 brings individuals from Legislative Branch agencies together with data users and transparency advocates to foster a conversation about the use of legislative data – addressing how agencies use technology well and how they can use it better in the future." Learn more here.
  • June 28th, 10am EST: How Can Demand Driven & Bottom Up Social Accountability Tools Improve Health Services? The Experience of Rural Mozambique, Webinar. "This webinar explores how Concern Universal has managed to find the intersections in incentives and goals between government and rural communities while helping overcome some crucial gaps in health service delivery. It focuses on lessons learned through application of collaborative government/citizen’s approach. More information here: http://bit.ly/2sUtR0C"
  • June 29th: DATA Act Summit 2017 in Washington, DC. "The fourth annual DATA Act Summit, hosted by the Data Coalition and Booz Allen Hamilton, will bring together supporters of the open data transformation from across government and the private sector." Learn more and get your tickets here.
  • July 5, 10am EST: ICT-mediated Citizen Engagement: Voice or Chatter? Webinar. "In this webinar, IT for Change will present the results of eight empirical case studies of citizen engagement through ICTs they undertook. This research, funded by Making All Voices Count, explored in each case how new forms of participation were shaped by IT, how IT affected power relations between government and citizens, and how the interactions between different actors continuously shape governance. More information here: http://bit.ly/2rb4TJ3"
  • September 11th and 12th: TicTec@Taipei in Taipei. "TICTeC@Taipei is the first ever conference about the influence of civic tech to be held in Asia. We’ve invited members of academia, business, politics, NGOs, education to participate, and discuss their research. We hope through this event, we can build a global network of civic tech enthusiasts." The event is being held during #CivicTechFest 2017. Learn more, submit a session proposal, and register to attend here.

 

Tired of your boss/friend/intern/uncle forwarding you this email every morning? You can sign up here and have it delivered direct to your inbox! Please send questions, comments, tips, and concerns to todayinopengov@sunlightfoundation.com. We would love your feedback!

 
Categories: Research

Is Coinbase Closing Accounts For Paying Ransoms With Bitcoins?

Slashdot: Your Rights Online - Mon, 06/19/2017 - 03:34
Even as some comparnies are stockpiling bitcoins so they can quickly pay ransom demands, security firms that try paying those ransoms may face losing their accounts on Coinbase. Slashdot reader Mosquito Bites quotes a report from CoinDesk: Less than a year ago, Vinny Troia, CEO and principal security consultant of Night Lion Security and a certified white hat hacker, was sent a compliance form by US bitcoin exchange Coinbase, where he had an account. Coinbase wanted to know how Troia was using bitcoin and his account. "I told them I run a security firm. I pay for ransoms and buy documents on the dark web when clients request it," Troia told CoinDesk. The ransoms Troia helps his clients pay are those stemming from ransomware attacks, which have surged in number over the past few years. Many, like the well-publicized WannaCry attack, are asking for bitcoin. And the documents? Troia said, "We do breach investigations a lot of times. If a fraudster is saying they're selling my client's stolen documents, the only way to make sure they have what they say they have is to buy those documents." According to Troia, Coinbase "did not like that at all." Coinbase then asked the IT expert whether he had a letter from the Department of Justice giving him permission to do those things. No, Troia said. Upon further research, Troia has not found that any such permission exists. But, "I have my clients authorizing me to do this," he said. Coinbase sent Troia back an email explaining that those actions were against the exchange's rules and shut down his account... "My entire family is blocked from Coinbase," he said.

Read more of this story at Slashdot.

Categories: Research

Historical Marker Database

beSpacific - Sun, 06/18/2017 - 22:02

“This website, The Historical Marker Database, is an illustrated searchable online catalog of historical information viewed through the filter of roadside and other permanent outdoor markers, monuments, and plaques. It contains photographs, inscription transcriptions, marker locations, maps, additional information and commentary, and links to more information. Anyone can add new markers to the database and update existing marker pages with new photographs, links, information and commentary.”

Categories: Research

Google has thousands of bird sounds visualized using AI

beSpacific - Sun, 06/18/2017 - 21:59

“Google has had thousands of bird sounds visualized using AI. Background. “Bird sounds vary widely. This experiment uses machine learning to organize thousands of bird sounds. The computer wasn’t given tags or the birds’ names – only the audio. Using a technique called t-SNE, the computer created this map, where similar sounds are placed closer together. http://g.co/aiexperiments – Built by Kyle McDonald, Manny Tan, Yotam Mann, and friends at Google Creative Lab. Thanks to Cornell Lab of Ornithology for their support. The sounds are available in the Macaulay Library’s Essential Set for North America. t-SNE animation featured in video by Gene Kogan.”
More resources:
https://github.com/lvdmaaten/bhtsne
http://www.birds.cornell.edu
http://macaulaylibrary.org
http://ml4a.github.io

Categories: Research

Special Prosecutor Mueller continues to build subject matter expert legal team

beSpacific - Sun, 06/18/2017 - 18:38

AXIOS via AP – “Meet Bob Mueller’s team tackling the Russia probe – Special Counsel Robert Mueller is leading the Russia investigation and, most recently, the investigation into whether President Trump obstructed justice. Suffice to say, he’s taking the matter seriously, as evidenced by the team of lawyers he has quietly hired over the past few weeks to help him. Between the lines: The people he’s hired don’t just look tough on paper — they’re legal experts with unique, complementary strengths who have fought and investigated crime all around the world. Their expertise suggests how Mueller views this investigation and the direction in which he is hoping to take it. The original team started as just three lawyers (plus Mueller) who all once worked at the law firm WilmerHale, where Mueller has worked since his 2013 departure from the FBI. Meet the full investigation dream team…”

Categories: Research

Innovations in legal technology leverage search and discovery

beSpacific - Sun, 06/18/2017 - 17:34

Upsetting The Applecart Of Legal Research – Are we entering a golden age of legal research innovation? By Robert Ambrogi

If you had to pick the most staid area of legal technology, you might choose legal research. After all, Westlaw and LexisNexis pretty much set the standard for online legal research long ago, and many of the smaller research services that have come along since are essentially less-comprehensive variations on the same theme. Yet within a few days of each other earlier this month, there were three major developments pertaining to legal research, each of which suggests interesting new directions for legal research. In fact, after I wrote about the three developments on my Lawsites blog, it prompted Ed Walters, the CEO of legal research service Fastcase, to tweet, “Might we be entering a golden age of legal research innovation? Sure feels like it.” Of course, innovation in legal research has been going on for a while now. Middle-tier services such as Fastcase and Casemaker are frequently refining their platforms and adding new features. Startups such as Casetext and Ravel Law have introduced innovations that even the big players have emulated. Startup ROSS is bringing IBM Watson’s artificial intelligence to legal research. Still, all three of these recent developments signal possible new directions in legal research. Let me review them briefly…”

Categories: Research

Pages