Listing Innovations

- Lead: Alexander Goldman - Video: [Technical Standards for Warrant Canaries](https://www.youtube.com/watch?v=ebNtDvSJVrs) - URL: [http://canarywatch.org](http://canarywatch.org) - Theme: Privacy / gag orders A warrant canary is pro-business civil disobedience for the new digital age. It is a method for preventing gag orders by posting a notice that says that an organization has never received a gag order. Once the organization does receive a request accompanied by a gag order, the statement disappears (the canary dies).

- Lead: Aamir Rahman - Video: [3D Printing Code of Conduct](https://youtu.be/XybZ99Yr4Pg) - Theme: Technology, Rules and Regulations Working on behalf of 3D Hubs and together with students at the University of Amsterdam, we are working to create a Code of Conduct for users in the 3D printing community. We would like to create a website where standards and laws from different countries (starting with the US and EU) can be easily accessed by anyone around the world. Although there are countless benefits that can be attributed to the emergence of 3D printers, there are a handful of issues that may arise in the areas of intellectual property law, tort law, criminal law, health law and privacy law. We are putting together the laws as well as standards as to how individuals who own 3D printers agree not to use their devices.

- Lead: Lili, Phil & Ed - Video: [LawSTAR](http://youtu.be/UvklRuZgX3E) - Theme: Technology, Legal Education LawSTAR is an Interactive and efficient online resource - for Law Students, by Law Students. LawSTAR looks to bring technology, efficiency, and accessibility to a community of our peers in order to improve our student experience and access a platform to exchange materials.

- Lead: Andrew Braunstein - Presentation: - Theme: Technology In the currently saturated legal market, it is increasingly difficult to find “the needle in the haystack” - attorneys and legal resources that address each consumer’s unique needs, including expertise in a specific area of law, geographic reach, and often most importantly, cost. Free Legal hopes to provide more direct, more streamlined, and more effective access to justice for those who need it most.

- Lead: Patrick Bannon - Video: [Take Down My Photo](https://youtu.be/vC3M_jGbX0U) - URL: [http://takemyphotodown.herokuapp.com/](http://takemyphotodown.herokuapp.com/) Allow victims of revenge pornography to use DCMA to have photos removed from sites. The Legal Hackers devised a system called Take My Photo Down that can send an automatic letter to the platform that is hosting the pornography and order them to take it down, or be subject to damages, he said. The “tougher question” is, however, instilling authorship in a photo taken by someone else, he noted.

- Lead: Caitlin Stilin-Rooney - Video: [StoreWell](https://www.youtube.com/watch?v=PolAPH3_7hg) - URL: [http://prhana.github.io/StoreWell/](http://prhana.github.io/StoreWell/) - Theme: Technology, Data Security & Personal Data Mgmt, Legal Agreements StoreWell will need to solve payment and liability issues for massage therapists practicing without a license or before being licensed, legal audits, and a set of recommendations for agreements for the sharing of data.

- Lead: Jason Walsh - GitHub: [FirstToDisclose/firsttodisclose.net](https://github.com/FirstToDisclose/firsttodisclose.net) - Presentation: [MIT-ABA Legal Appathon 2015: FirstToDisclose](https://www.youtube.com/watch?v=8l5CKzFCvUs) - Background: [ABA-MIT Online Legal Appathon](https://www.youtube.com/watch?v=FmC-7R93XqY]) FirstToDisclose.net is a community-powered online repository for inventors to disclose their inventions and other innovations to the public. The use of FirstToDisclose.net may help prevent another person or entity from claiming patent protection on your idea.

- Lead: Paula Collins - Video: [FLIC](https://youtu.be/y4MrEpekHJc) - Theme: Digital Rights Management FLIC stands for the Film Legal Information Center. FLIC is an app designed to organize all of the business and legal needs of indie film artists and game designers into one environment. Users have the opportunity to view a library of informative videos and blogs, book and participate in live discussions specific to the issues of your project. You can also populate, sign, email, and print contracts from within the mobile app. FLIC is more than just a series of templates; documents are customizable and adaptable to meet the parameters of your film or digital arts project.

- Lead: Ben Brash - Presentation: [Legal Capture](https://youtu.be/cXR6UEtT45Q) - Theme: Technology Every year law enforcement officers issue millions of tickets for parking, traffic, and low-level criminal infractions . Many individuals who receive those tickets do not know all the legal remedies available to fight the tickets or the ramifications of pleading guilty. The sheer volume of tickets issued creates inefficient interactions for citizens with the justice system. The system, its rules, and penalties are confusing and not created for the digital age.

- Lead: Evan Absher, Doug Seacord, Paul Barham, - Video: - Theme: Data Security & Personal Data Mgmt Should and can a Municipality become an Identity Provider in the OIDC context? Can a municipality help construct an architecture to create and protect substantive data rights? Will a municipality better align the the interests of the users, businesses, and public entities? Can a municipality technically handle being an IdP?

- Lead: Liz Conroy, Nick Ajello, and Rob Rose - Video: [Incubator/Law Firm Hybrid](https://youtu.be/BGAEhZ1iC3g) - Theme: Practice Management In a changing legal economy, many traditional law firms are seeking opportunities to connect with innovators and develop mutually beneficial relationships. Our team will explore the ethical and practical concerns for lawyers interested in incubating and accelerating innovation within a traditional law firm setting.

A network correction security system. The network correction security system connected between a network node and a security-related external system, detects attacks on the network node, corrects weak parts of the performance of the network node, collects information for improving the security performance of the network node from a security-related external system, analyzes the information, monitors principal resources of the network node to detect a fault, and removes the fault according to a measure corresponding to a grade of the fault. The network correction security system carries out a recovery process when the fault has not been corrected, and recovers the functions of the network node according to a recovery mechanism when the fault has not been removed after the recovery process.

Take-down notices should be honored during reviews. The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet.[1][2] Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users.

There is disclosed a test access port controller for effecting communications across a chip boundary having a test mode and a diagnostic mode of operation, wherein in the test mode of operation the test data is resultant data from a test operation having an expected and time delayed relationship, and in the diagnostic mode of operation diagnostic data is conveyed both on and off chip in the form of respective independent input and output serial bit streams simultaneously through the test access port controller.

A large-scale data processing system and method includes one or more application-independent map modules configured to read input data and to apply at least one application-specific map operation to the input data to produce intermediate data values, wherein the map operation is automatically parallelized across multiple processors in the parallel processing environment. A plurality of intermediate data structures are used to store the intermediatedata values. One or more application-independent reduce modules are configured to retrieve the intermediate data values and to apply at least one application-specific reduce operation to the intermediate data values to provide output data.

A system and method for automatically generating a narrative story receivesdata and information pertaining to a domain event. The received data and information and/or one or more derived features are then used to identify a plurality of angles for the narrative story. The plurality of angles is then filtered, for example through use of parameters that specify a focus for the narrative story, length of the narrative story, etc. Points associated with the filtered plurality of angles are then assembled and the narrative story is rendered using the filtered plurality of angles and the assembled points.

A system operates using meta-documents which include document content associated with one or more personalities. Each personality is associated with a set of document service requests. Users are provided different techniques for creating personalities and modifying existing personalities. These techniques include: the use of an algebra to tailor existing personalities, the use of a list of links or documents to create a personality, the use of predefined personalities and knowledge levels in a field to create new personalities, the use of question answering techniques, and the use of learning personalities. Specified personalities are then used to enrich document content by integrating into corresponding meta-documents the results received from their document service requests.

A system operates using meta-documents which include document content associated with one or more personalities. Each personality is associated with a set of document service requests. Users are provided different techniques for creating personalities and modifying existing personalities. These techniques include: the use of an algebra to tailor existing personalities, the use of a list of links or documents to create a personality, the use of predefined personalities and knowledge levels in a field to create new personalities, the use of question answering techniques, and the use of learning personalities. Specified personalities are then used to enrich document content by integrating into corresponding meta-documents the results received from their document service requests.

Architecture for improving text searches using information redundancy. A search component is coupled with an analysis component to rerank documents returned in a search according to a redundancy values. Each returned document is used to develop a corresponding word probability distribution that is further used to rerank the returned documents according to the associated redundancy values. In another aspect thereof, the query component is coupled with a projection component to project answer redundancy from one document search to another. This includes obtaining the benefit of considerable answer redundancy from a second data source by projecting the success of the search of the second data source against a first data source.

A ranked list of search results is received from a search engine based on a search query. A relevance value of a particular search result in the ranked list is estimated based on its rank and actual relevance values and ranks of at least two others of the search results.

New Innovation