Judicial Test Pilot tags: LitSupport MM E-Discovery: A Special Master’s Perspective tags: LitSupport MM Achieving Success as a Non-Attorney in a Law Firm: Find/Make the Right Environment, Part 2 tags: LitSupport MM Achieving Success as a Non-Attorney in a Law Firm: Find/Make the Right Environment, Part 1 tags: LitSupport MM “Where The Money Goes” –…
Screen Time: Conclusions About the Effects of Digital Media Are Often Incomplete, Irrelevant, or Wrong/a> Cybersecurity – What Keeps Us Up at Night Chrome Will Kill Tracking Cookies… by 2022 Degradation: How TIFF+ Disrupts Search Top 10 Predictions for the Legal Tech Job Market 2020 Content Moderation At Scale Is Impossible: YouTube Says That Frank…
Overview of the Advanced eDiscovery solution in Microsoft 365 Lawyers Are In the Information Business. Get Over It The Document Demand That Seeks Electronically Stored Information – How to ask for #ediscovery Who’s to blame for ransomware attacks — beyond the attackers? How to See if Zoom Is Running a Secret Web Server on Your…
I have a question about this part of the article. Since I’m not a lawyer, I don’t know the answer to this. First, the pull quote: Larger businesses are more likely to have IT departments with savvy administrators that are able to lock down private channels to prevent abuse, but many smaller companies may be…
The New Normal:Better Than Normal
-For years, we have been told that administrative staff, especially legal assistants, cannot work from home. Apparently, that is not true.
INSIGHT: Redesign the Legal System for More Than Just Lawyers
It’s About Time!
– Clues to time are clues to truth
Why We Need to Think for Ourselves
7 Questions you need to ask before buying an eDiscovery solution
What Will Happen to Your Digital Life When You Die? Will it Go to Hell?
Are Passwords Obsolete?
New 39 Worrying Cyber Crime Statistics [Updated for 2020]
Reflections on Online Events and Virtual Handshakes
It’s Time to Put Self-Care Before Productivity
What steps should businesses take for ransomware protection? 44 security experts weigh in.
The Text Message Deduplication Dilemma – Part 1:Let’s play “Fill in the Text Message Gaps”
Apparently, while 2011 was a year of huge changes for me, the changes just keep coming in 2012. I won’t be relocating again, but I will be switching jobs, and that is going to also impact what I’m doing on this site. I’ve accepted a Litigation Support Trainer position with AccessData. I’ll be based out…