AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Backward digit span test pdf3/23/2023 DB additionally recruited bilateral DLPFC, left IPL, and Broca’s area. The degree of activation increased linearly with increasing task difficulty in DF. Combined data from both experiments demonstrate that DF and DB rely upon a largely overlapping functional neural system associated with working memory, most notably right dorsolateral prefrontal cortex (DLPFC) and bilateral inferior parietal lobule (IPL) as well as the anterior cingulate, a region associated with attentional effort. No differences in activation were found between the two experimental groups. To eliminate possible visuospatial confounds, Experiment 2 replicated the first experiment in six additional healthy participants who were blindfolded during the study. DF and DB each activated frontal, parietal, and cerebellar regions as well as prominently activating medial occipital cortex. In Experiment 1, eight healthy participants performed verbal DF, DB, and a sensorimotor control task during measurement of regional cerebral blood flow (rCBF). We therefore examined the shared and separate neural systems of these tasks in two positron emission tomography (PET) experiments. Studies of focal brain lesions have partially elucidated the brain regions essential for these tasks however relatively little information exists on the underlying functional neuroanatomy in the intact brain. The digits forward (DF) and backward (DB) tasks are widely used neuropsychological measures believed to tap overlapping systems of phonological processing and working memory. More broadly, our results demonstrate that task analysis is a vital partner of neuroimaging in the cognitive neuroscience enterprise. These results call into question conclusions that have been drawn about the neural basis of working memory. A fourth experiment suggested that the location n-back task may recruit verbal processes in addition to spatial processes. We report three behavioral experiments demonstrating that the letter n-back task additionally recruits spatial processes. Neuroimaging researchers have assumed that the letter n-back task only engages processes involved in the short-term maintenance and manipulation of verbal information. We demonstrate the danger in making such assumptions using, as an example, the n-back task, which has been widely used in neuroimaging studies of working memory. When functional neuroimaging researchers draw conclusions about the sensory, cognitive, or motor processes that are associated with changes in brain activity, they are making assumptions about the component processes involved in performing a complex behavioral task. These findings are consistent with an emerging construct of consent capacity in which discrete decisional abilities are differentially associated with cognitive processes and indicate that the sensitivity and accuracy of consent capacity assessments can be improved by evaluating decisional abilities separately. Prevalence of incapacity was greater than expected in participants with and without significant cognitive impairment when decisional abilities were considered separately. Neuropsychological performance and within-person variability were independently associated with continuous and dichotomous measures of capacity, and within-person neuropsychological variability was significantly associated with within-person decisional ability variability. Participants completed the MacArthur Competence Assessment Tool-Treatment and 11 neuropsychological tests commonly used in the cognitive assessment of older individuals. Participants were recruited from the community with fliers and advertisements and consisted of men (N = 79) and women (N = 80) with (N = 83) or without (N = 76) significant cognitive impairment. Assessments were performed in the participant's preferred location (e.g., outpatient clinic office, senior center, or home). Standard scores were used to compute mean neuropsychological performance and within-person across-test variability. Participants completed a neuropsychological test battery and a standardized capacity assessment. This study examined the relationship of within-person across-test neuropsychological performance variability to a current construct of treatment decision (consent) capacity. Within-person across-test neuropsychological performance variability has been shown to predict future dementia. The capacity of older adults to make healthcare decisions is often impaired in dementia and has been linked to performance on specific neuropsychological tasks.
0 Comments
Read More
Back to Blog
The expanse seasons3/23/2023 Holden and crew fight for survival in a badly damaged shuttle. On Ceres Station, Detective Miller begins an off-the-books investigation of a missing heiress, Julie Mao. In the asteroid belt near Saturn, James Holden and the crew of the ice freighter Canterbury investigate a distress call from a mysterious derelict ship, the Scopuli. Frances Fisher as Elise Holden ("Windmills").Rossif Sutherland as Neville Bosch ("Back to the Butcher").Kenneth Welsh as Franklin DeGraaf ("Remember the Cant").Jonathan Banks as Executive Officer ("Dulcinea").François Chau as Jules-Pierre Mao (2 episodes).Kristen Hager as Ade Nygaard (2 episodes). ![]() Kevin Hanchard as Inspector Sematimba (3 episodes).Martin Roach as Admiral Souther (3 episodes).Brian George as Arjun Rao (4 episodes). ![]()
Back to Blog
Norwegian coinage3/23/2023 ![]() The image from the die turned the blank metal into a coin. Then, they simply placed the blank between the two dies and hit the top die with a hammer. Patterns were etched into iron – a much tougher metal than silver or gold – to create dies. These were then beaten into thin sheets and circular blanks would be punched or chiselled out. Ingots – usually of silver, but other metals were used – would be heated. Most of the rest of the world, including Scandinavia, made struck coins. Cast coins were only really made in the Far East. You can either melt metal and pour it into moulds to make cast coins or you can make discs of metal and then hammer an imprint into them to make struck coins. There are two main ways of minting coins. These coins were fairly primitive compared to others of the period and were likely intended as payments to soldiers rather than for use in trading. His successors Anand Jacob and Canute I also minted coins at Sigtuna. This was mainly around the town of Sigtuna near Stockholm. ![]() Sweden was also experimenting with coins in the 990s under Olof Skötkonung who issued coins with his image and title. Under the reign of Harald Hardrada, who had experience of currencies during his time with the Byzantine emperor, a national currency was established. Initially they were silver pennies with a weight of around 0.89g but over time the amount of silver was lowered in favour of copper. Norwegian coins also start around the same time under the authority of Olav Tryggvason, who had also been a commander of Viking forces in Britain. Coins were mostly made in Lund but there were also mints at Ribe, Hedeby and Aalborg. The first known coins were issued by Sweyn Forkbeard and continued under Cnut. The English coins gained through the Danegeld became the prototypes of the first Danish coins and often included the same imagery even though they were minted in Denmark. Once the Danelaw was established it was kept on as a land-tax. ![]() Initially it was raised as tribute to the Viking invaders to effectively pay them off and stop them attacking. The Danes in Britain had enforced what was known as the Danegeld. Known mints in Scandinavia sprung up towards the end of the 10 th century. The Vikings understood that they needed to work on their image to improve their appearance to the rest of the world! Mints in Scandinavia Lumps of metal are for barbarians and coins are for refined people. The Oseberg ship in Oslo's Viking ship museum.Ī large part of the impetus behind the Scandinavia Kings developing coins was that they were seen as a sign of civilisation. From the initial raids on the East coast the Vikings quickly became familiar with coins.Ĭontinuing through to the establishment of the Danelaw – the vast swathe of Northern and Eastern England ruled by the Danes – the Vikings managed to amass a large quantity of coins without making their own. Coins were well established in Northern Europe, including the Anglo-Saxon kingdoms of the British Isles. The second route, as you’d no doubt expect from Vikings, was through raids in Viking ships. It also brought coins and it’s likely that the first coins to be known in Scandinavia were from the Islamic countries. The Silk Road, stretching from China to Southern Europe, allowed goods and ideas to flow between the East and the West. The Vikings encountered coins through two routes. King Alyattes of Lydia, now part of modern-day Turkey, is widely considered to have produced the first coins, known as Lydian Lions for the image stamped on them, in around 600 BCE. Silver and gold were used in the Viking Age, based on weight Raiding and tradingĪround this time, most other civilisations and cultures were already well-versed in the use of metal tokens specifically designed for the purposes of trade. Often pieces would be cut into pieces known as ‘hack silver’ when smaller amounts were needed. For trade, the silver could be formed into bars and ingots, or simply traded as jewellery. Silver was the main precious metal of the day as it was relatively common, but they also used gold.Īs the value of precious metals grew, they became associated with wealth and the more affluent Vikings would wear silver jewellery and use silver weapons. Initially, and again like many civilisations, the Vikings developed a bullion economy, using precious metals in place of commodities. This works well for small transactions between a couple of people who can each fill the other’s needs.īut what happens if you need some grain and you don’t have a sheep? Or if you need 100 sheep but you don’t need 100 sacks of grain? You’re gonna need some kind of token of value that can be used instead of goods.
Back to Blog
Wet weather wall3/23/2023 ![]() You can gain faster drying times, reduced cracking and water retention in the winter. Simply mix in 100ml of Render Accelerator per 25kg bucket of render. When applying Silicone or Acrylic Renders in colder weather, Render Accelerator is excellent for speeding up drying times. If this is the case, the render may retain moisture for too long and thus become susceptible to damage from this trapped moisture. Working in Cold WeatherĬold weather means that the render may not dry out fast enough. So, when the render shrinks during the process of drying, the mesh will help to prevent cracking. This is even more essential when the weather conditions for rendering are not ideal, as the Fibreglass Mesh increases the tensile strength of the whole system. We also advise that mesh is embedded within the first layer of Monocouche. Causing it to crack during the curing process.įor our thin coat render systems, we always advise the use of Fibreglass Mesh embedded within the basecoat layer. Using a primer prevents the substrate from absorbing too much water from the render. During hot weather, ordinary masonry will have dried out and the absorptive capacity of the substrate will be extremely high. This allows you to continue to work in sunny weather, but prevents issues with the render drying out too fast in direct sunlight.Ī Water Based Primer limits the absorptive capacity of the substrate. Then follow the sun around the building working on the walls that are in the shade. Start by applying on a wall that is not exposed to sunlight. Tips for Rendering in direct sunlightĪn old trick that lots of renderers use is to start before the sun has fully risen (many of our installers start out at around 5 am!). Resulting in cracking and damage, or even a patchy finish. This is the most probable cause of the render drying out too fast. Most especially, we advise that if it’s a warm day it’s best not to render in direct sunlight. We always advise not to use our materials in temperatures over 30 degrees. So here’s our advice on what to do when the weather conditions aren’t ideal for rendering! Rendering in Hot Weather Renderers simply need to be able to find ways to work around the heat, and the same goes for when the weather’s cold. This isn’t to say that an unprecedented heatwave should put a halt to all works, as we know temperatures can reach well over 25 degrees in the summer. For EWI Pro renders it is advised that the optimal temperature for applying the renders should be between +5 and +25 degrees Celsius. The ideal temperatures for installing render varies between manufacturers. Things don’t always go to plan when working on a construction site, and sometimes weather conditions can affect whether or not you’re able to start rendering. What are the Ideal Weather Conditions for Rendering?
Back to Blog
The mnemosyne project3/23/2023 ![]() The Mnemosyne algorithm is very similar to SM2 used in one of the early versions of SuperMemo. We only ask that, should that analysis ever result in a scientific journal paper, we become coauthors of that paper. Since the data was contributed by people on a voluntary basis, it would be unethical to restrict access to it or charge money for it.Īnyone interested can contact us to help analyse the data. The data collected by the Mnemosyne Project will made available to everyone. ![]() This could potentially give us very valuable insight into the nature of long-term memory and the ultimate performance of spaced repetition. Looking to the future, we would like to continue to collect data over a very long time span (years and hopefully decades). The Mnemosyne Project has been collecting data since 2006. Secondly, since we have no commercial interest, there is no need for us to claim that the algorithm in a next (expensive!) version is really better than the one in the version you already bought. Also, thanks to the internet, we can easily gather the anonymous data, without requiring any user intervention (after they gave their initial permission, of course). As Mnemosyne is completely free and will always remain so in the future, there is no barrier for new users to participate. These two needs are best served with open source software. In order to get such data in a statistically relevant way, one needs two things: However, most of these programs are commercial, and therefore there is no real independently verifiable data that e.g. There are several similar programs out there, implementing different spaced repetition algorithms with various levels of sophistication. The first thing we will investigate is how well our scheduling algorithm performs, how robust it is with respect to late revisions, etc. Let's see how this works in practice in the Mnemosyne program. It is clear that a computer program can be very valuable in assisting you in this process, by keeping track of how difficult you find an card and by doing the scheduling of the revisions. This allows you to focus on things you still haven't mastered, while not wasting time on cards you remember very well. Based on the work of these people, it was shown that in order to get the best results, the intervals between revisions of the same card should gradually increase. This is what is called the spacing effect.ĭuring the past 120 years, there has been considerable research into these aspects of human memory (by e.g. ![]() However, as you probably know from experience, it is much more effective to space out these revisions over the course over several days, rather than cramming all the revisions in a single session. When you have memorised something, you need to review that material, otherwise you will forget it. Here, we discuss some of the principles behind the Mnemosyne project:įor an overview of using the software, see the Getting Started guide.
Back to Blog
Boom 3d not working windows 103/23/2023 ![]() For now, I use a simple batch script which i created for this and moved it in startup folder. Hi, To address your concern regarding the Bluetooth connectivity, kindly click this link and follow the steps provided for fixing Bluetooth problems. Instead you can use Nahimic2Nahimic2UI.exe from same directory, link it to desktop shortcut or since you will not find tray icon so you create a toolbar on taskbar and add shortcut on that.īelieve me, I don't like it doing every time when I turn on laptop, still waiting for developers to solve this problem. Remember not to start Nahimic2UILauncher.exe in Nahimic directory or any shortcuts (desktop) linked to it or else you will need to do above stuff again. You should observe that audio will stop for a second and start again according to preset and also the equalizer and those effects working. When the application opens, click the Install button. Next, double-click and then drag and drop the. Then refresh audio by shutting down 'Windows Audio Device Graph Isolation'. Install Boom 3D On Mac: First, download the setup file for your Mac from Boom 3D’s official website, just as you saw in the Windows version. Read also: Change Taskbar Transparency on Windows 10. Now, enough of the talking and we shall start with the actual process. Also, you need to attach your headphones to the PC so that you can enable the 3D Surround Sound. ![]() Now shutdown those three processes stated above. For this, you need to have a PC or Laptop running Windows 10, of course. For this, you need to have a PC or Laptop running Windows 10, of course. I’ll certainly assist you with the issue. I understand that you are unable to use Paint 3D application on your computer. I appreciate the efforts taken by you in resolving the issue. Boom 3D is a pro audio enhancement app that has been designed to play all your media content with incredible 3D effects on ANY headphones /speakers, from any player, any media, any streaming services. Hi, Thank you for writing to Microsoft Community Forums. Now the audio will be enhanced but kind of low volume, you can check it by turning on or off middle power button in UI, cannot be edited with equalizer or 'Bass Boost'/'Reverb' effects, nothing works. In reply to NikharKs post on March 18, 2021. When you don't, let it stay open, don't close the app and play some song on youtube or something else. Let Nahimic start up with windows, wait for some time until 'Nahimic', 'Nahimic2Svc' and Nahimic2Svc64' processes appear in task manager, then launch nahimic app.Īs UI appears, you might find it working as usual. Update: I'm using Realtek 8186 driver with nahimic 2.5.31
Back to Blog
Best knotes3/23/2023 ![]() READ MORE: 7 TIPS FOR HAMMOCK CAMPING WITH MAN’S BEST FRIEND This knot is often used to anchor a boat to shore, attach the guy line of a tent to pegs, hang a hammock with adjustable tension, or tie a rainfly to stakes and trees for easy adjustments. The Taut Line Hitch is a moveable knot that can be adjusted up or down a length of rope. Make another half hitch in the same direction and pull it tight. To tie this hitch, do two full turns around an object with a rope. ![]() This hitch is also resistant to fraying, so it can be used to tie to an abrasive object, such as a metal ring or grommet. And it is also easy to tie once you’ve mastered the half hitch. It won’t usually jam together, so it is easy to untie and is ideal for guy lines. This hitch is used to secure a rope to a pole, often for lashing objects together. Then pass the working end around the standing end and through the loop. To tie a half hitch, run a loop around an object, like a post or pole. READ MORE: HAMMOCK CAMPING IN COLD, RAINY WEATHER? HERE’S THE GUIDE TO KEEP YOU WARM & DRY FEATURED PRODUCT: HAMMOCK RAIN FLY - 70D OXFORD POLYESTER – RIPSTOP The Half Hitch is often used to quickly tie a rainfly to a tree and for anchoring gear to the eye bolt of a vehicle. While not very secure on its own, it can be doubled for strength. ![]() This basic camping knot is used as a foundation for many other knots. READ MORE: TOP 12 ONTARIO BACKPACKING TRAILS – YOURS TO DISCOVER Here are the best types of knots and uses for hiking, camping, and enjoying the great outdoors. Jamming: A knot that is very difficult to untie.Įye: The loop created with a rope and knot.īight: A semicircle of rope bent into a U-shaped section. Turn: Rope that is turned around an object. Tail: The short end of the rope that is being knotted. Standing End: The part of the rope you are not using to tie a knot. Working End: The part of the rope you are working with to tie a knot. To help you understand knot-tying lingo, here are the basic terms you should know: Hitches are useful for strapping down objects you’re transporting or want to hold down/control.Ĭat’s Paw, Barrel Hitch, Clove Hitch, Half Hitch, Rolling Hitch, Taut Line Hitch, and Round Tie and Two Half Hitches READ MORE: HOW TO SAFELY HANG A HAMMOCK FROM A CAR BendsĪ bend is used to tie two different ropes together, especially if you have two different sizes of rope or you’re lengthening a cut piece.īeer Bend, Hunter’s Bend, Figure 8 Bend, Sheet Bend, Slim Beauty Bend, and Flat Overhand Bend KNOT TERMINOLOGY But these days, people refer to knots, hitches, and bends as knots.īowline, Nail, Square, Water, Fisherman’s, Surgeon’s, and Figure 8 HitchesĪ hitch is used to tie a rope to another object, usually another piece of rope or a cylindrical object such as a stake or a tree. FEATURED PRODUCT: PARACHUTE EXPEDITION HAMMOCK – DOUBLE KNOTS, EXPLAINED Basic KnotsĪ basic knot is used as a stopper to prevent a rope from slipping through a bolt eye or a similar structure. Whether you want to ensure your hammock is tied securely or you simply want to build on your knot-tying skills, here’s a guide to knots, including the 10 essential knots everyone should know when hammock camping and exploring the great outdoors. Audio Version The Best Types of Knots to Learn, Including How to Tie a Knot When Hanging Hammocks
Back to Blog
Cartoon animator 4. ...3/23/2023 ![]() ![]() If they don't, you can click on the Show Bone check box to activate it. Upon entering Composer Mode you will notice that the bones now appear on the Dummy. To replace the sprites of the character we need to enter Composer Mode by clicking on the button near on the top left of the stage preview window. With the dummy selected, click on the Zero Key button at the top to make sure that it is on the scene route. To create a rig for your character we need to navigate to Actor Template > Character > _G3 360 > 1_G3 360 Human > Dummy for 3D Motion to access all the available body dummies that you can use.įrom here you can choose the angle which fits closest to your character:įor this example we will be using a character which is facing to the side at an angle, so let's use Dummy_2 Front Side by clicking and dragging it into the scene. Once you have access to the Content Manager, select the Actor tab and then select Template.įrom here you can browse through all the different types of characters, heads, body types and accessories that you can use for your animation. You can access the Content Manager by going to Window > Content Manager or by pressing F4 on the keyboard. Here we will be able to browse through the library of character templates, heads and body shapes that we can use as a starting point. We used the following graphic packs from Envato Elements, click on the links to download them:īefore we begin to create our own custom character, let's take a look at the Content Manager inside Cartoon Animator. You can download a free trial version for Cartoon Animator on the Reallusion Website. To follow along with this tutorial you will need your own versions of Adobe After Effects and Cartoon Animator. In our next tutorials, we'll explore how to make a talking avatar, how to create smooth head-turns, and how to animate any photograph. ![]()
Back to Blog
Newest version safari for mac3/23/2023 To start the update there will be an 'Update' button. If you have an update available it will list the version of macOS that you will be updating too, and what is going to. Whether it’s using communcations apps to talk with friends, family or. The “Compact” Monterey look can be enabled for those who prefer it. How to Update Safari on a Mac Open 'System Preferences' and click on the 'Software Update' icon. We pick our favourites, including Safari, Edge, Chrome, Brave, Vivaldi and more. There were Safari design changes to the tab interface, but right before Monterey was released, Apple reversed the changes. Note, however, that it’s not always possible to upgrade older Macs to the latest version of macOS. Messages supports Shared With You, and Tab Groups in Safari allow tabs to be organized together and accessed across devices. How to update Safari via the App Store If you use macOS High Sierra or earlier, you can update Apple's default browser by simply upgrading macOS via the App Store. There’s also a macOS Big Sur 11.6.1 update available for individuals who don’t want to upgrade to macOS Monterey, which Apple claims includes security updates. Image: Apple Apple has released the latest version of its Safari browser for macOS Catalina and High Sierra, ahead of the. ![]() My conditional access policy only has require MFA checked and nothing on the session tab. Safari for Mac has a condensed and minimalistic interface that offers mac users faster, private browsing with fewer interruptions and extended battery life. ![]() MacOS Monterey, like other Mac upgrades, is a free download. Apple announced the new Safari features back at WWDC 2020. We have a conditional access policy setup for our users and works great on Windows but macOS users get prompted every time they login to websites. The new macOS Monterey update is available in the Mac App Store and may be downloaded via the Software Update section of System Preferences on all eligible Macs. Safari comes installed on all Apple computers, so you shouldnt have to download and install Safari, but you can ensure that the latest version of Safari is. FaceTime has gained spatial audio support and voice isolation to cut down on background noise, and in the future, it will work with the SharePlay feature for screen sharing and watching tv and movies with friends and family over FaceTime. macOS Monterey adds quite a few features that have already been introduced on iOS devices with iOS 15 and iPadOS 15.
Back to Blog
Wickr me instructions3/23/2023 ![]() "I would go out on a limb and encourage people to reevaluate life choices.I thought this would work, but it doesn’t keep the root folder /snap persistent. "If you’re purposefully stealing trade secrets, that’s a different ballgame," says Josh Gilliland, a lawyer who writes about electronic discovery on the blog Bow Tie Law. That’s doubly true if you’re a larger company, since a court is more likely to hold you responsible if it knows you have the resources to do the proper thing.Īnd oh, if you're thinking of using a disappearing message app to discuss your illegal activity, the official legal advice is: don't. Whenever you think a lawsuit is coming, start hitting the "save" button. Your IT department might clear your email after 30 days it might allow a vendor to keep retain your messages on their encrypted, cloud-based server for 48 hours. Most electronic messaging applications with business-friendly editions-like Wickr-allow companies to retain data for a set amount of time, and set erase dates. Legal experts say you still need to have a plan in case you end up in a legal brouhaha, and that means knowing exactly how this technology works. But if a judge thinks you used Snapchat wantonly? Expect the hammer.Įven if you’re not using an app like Wickr to hide your wrongdoing, you want to be careful. This is all on a case-by-case basis, he says, so no legal outcomes are guaranteed. ![]() “Courts are starting to get much better at looking at the technical aspects of how the computer systems work and how this information is stored at the company on a person’s device, on a network, how it’s transferred out to a third-party network, and they’re expecting companies to know how all that works,” says Jablonski. That's the kind of disclosure that could swing a jury in a tight case.Īnd judges are getting savvier about what sorts of data companies control. Indeed, the judge overseeing the Waymo-Uber case has hinted he may the inform jury about Uber's wily legal dealings, including that the law firm handling the case tried to protect certain incriminating documents under attorney-client privilege. “I don’t think there would be many federal judges who would be happy with using a means of communication that would frustrate or impede discovery under the federal rules.” “Frankly, it’s appalling to me that someone could be using a network like Wickr for the express purpose of evading their potential obligations in litigation,” says John Marsh, a lawyer with the firm Bailey Cavalieri who specializes in trade secrets litigation. (In a 2016 case in Colorado, a judge held a company responsible for failing to hand over text messages during discovery, even though a low-level employee accidentally deleted those messages.) Thanks to federal court decisions dating back to the early 2000s, companies under threat of suit must save even electronic documents, and turn them over in discovery, if asked. And if you have an inkling that you could be sued, you're supposed to keep hold of your documents, instead of routinely destroying them. There are a few federal, state, and local regulations that require specific sorts of companies to keep specific documentation, like tax records, on hand. ![]() The company hasn't yet publicly produced decisive evidence that Uber used Waymo intellectual property to advance its self-driving efforts. This “may explain why the 14,000 files stolen from Waymo by Anthony Levandowski have not yet been discovered on the Uber infrastructure,” Waymo’s legal team wrote in a brief filed this week. Waymo’s theory is that Levandowski, Ron, and other Uber employees used Wickr and other "ephemeral" messaging apps, which delete conversations, to discuss the trade secrets they had stolen from Waymo. Levandowski and Lior Ron, another former Google self-driving engineer who ended up at Uber, also used it to communicate, according to testimony from Uber employees. According to pre-trial testimony, intelligence gathering teams at Uber used Wickr and another app called Telegram to discuss sensitive information. ![]() It's [like Slack, but for the Impossible Missions Force. Anybody can download Wickr to send encrypted messages that destroy themselves, but its professional, workplace product takes the extra step of giving the employers the power to determine how long the messages stick around before it deletes them. It wasn't a security analyst, like Ric Jacobs, a former Uber employee whose allegations of malfeasance within the company delayed the Uber-Waymo trial by two months as the judge reopened the document discovery process. It wasn't an engineer, like Anthony Levadowski, the former Google engineer who allegedly brought reams of Waymo trade secrets to his next big gig as head of autonomous driving at Uber. During a pair of explosive pre-trial hearings last week, the lawsuit between self-driving Alphabet spinoff Waymo and Uber over trade secrets got an unlikely, new star player. |