This Week’s Links (weekly)
Posted from Diigo. The rest of my favorite links are here.
Follow these topics: Links
eDiscovery Daily Blog: You Don’t Have to Be Rich to Use Richcopy – eDiscovery Best Practices
tags: Tech MM LitSupport
ADUC 2013: Day Two Round-Up – eDiscovery Insight
tags: LitSupport MM
What You Don’t Know About Secure E-discovery
tags: LitSupport MM
tags: Forensics LitSupport MM
ADUC 2013: Day One Round-Up – eDiscovery Insight
tags: LitSupport MM
Posted from Diigo. The rest of my favorite links are here.
Follow these topics: Links
Ed Bott raises an interesting question about people using PCs that don’t meet the requirements in terms of hardware security for Windows 11 but who own otherwise perfectly fine computers. In 2025, when Microsoft stops patching Windows 10, how many computers will still be out there, in use, connected to the internet, and vulnerable.
But in the quote above, Ed raises another point that maybe we should be thinking about more. What happens to all the hardware that is no longer supported as technology advances? It ends up in a landfill. That’s not good. That’s not even acceptable.
The Social Age of Evidence Collection tags: LitSupport MM The EDRM Buyer’s Guide – Part III tags: LitSupport MM 10 Ways to Develop Yourself Photographically tags: Photography MM 4 Networking Mistakes You Don’t Know You’re Making tags: Career MM How “Dark” is E-Discovery Pricing? tags: LitSupport MM Marketing a Litigation Support / eDiscovery Department within…
Google can use your name and photo alongside online ads, according to its new terms of service – The Next Web tags: SocNetPres MM How Spinning a Good Yarn Can Improve Document Review in e-Discovery tags: LitSupport MM Picking up your forensic toolbox and becoming your opposition’s BYOD nightmare tags: LitSupport MM Control of Personal…
If Sharon, and others, are right about this, on the other hand, they won’t have to: “There are many cybersecurity experts who believe it is only be a matter of time before device manufacturers and mobile operating system developers embed similar tools directly into devices themselves, making them impossible to escape. Embedding content scanning…
I’ve seen this tendency as well, though I have not yet seen anyone bring in their “good with computers” kid to run trial presentation. Still, I think what he talks about at the link is something attorneys need to take a moment and think about: “Today, I talk about what I still consider to be…
This is interesting, though I can’t help but think that the second reason at the end of this paragraph is less a technical problem than someone using your own culture against you. “Hackers always look for the weak link, and they have learned to get around MFA by exploiting gaps in companies’ lost-phone protocols. They…