Reading – 50 apps to improve your smartphone
This is a pretty impressive list. some of these I didn’t even know existed.
Might be worth a few minutes to see if anything catches your fancy.
This is a pretty impressive list. some of these I didn’t even know existed.
Might be worth a few minutes to see if anything catches your fancy.
Reinforcing Electronic Discovery Training tags: LitSupport MM All You Need is Metadata tags: LitSupport MM Satellite Offices of a Litigation Support Team tags: LitSupport MM “Assisted” is the Key Word for Technology Assisted Review tags: LitSupport MM Posted from Diigo. The rest of my favorite links are here. Follow these topics: Links
The study authors pointed out that they only researched text-based platforms. Video platforms may be worse in terms of toxicity. However, that hasn’t been my experience; they seem pretty similar to me, but that’s just anecdotal. They also pointed out that current-day social networks are much larger. Many more people see the toxicity on Facebook than people who saw a Usenet post in the 90s. That also means there is more total toxicity. It might only be 7-10% of the content, but the content generated by 500 million users dwarfs the content generated by 10,000 users. So there’s more of it; we are more aware of it, but the percentage hasn’t changed much.
Just finished the upgrade to Movable Type 4 on the Child Abuse blog. It seems to all be working, with the exception of the MT-Blogroll plugin, which isn’t compatible. That’s cool, the blogroll as it stands currently still shows up, I just can’t really add to it or anything. Eventually, if the plugin doesn’t get…
This is the one thing I’ve talked about before when it comes to where we might fall short on our cybersecurity training, we don’t really hold anyone accountable.
Make cybersecurity part of formal employee evaluation. Give people a reason to care. Much like I talked a couple of weeks ago about creating a training culture, provide a way for people to learn more and to learn from others. Give them space and time to talk about security. Recommend they read some security blogs, meet to share stories about the latest phishing information out there, etc.
“The parties themselves agreed at oral argument that an individual who, in the course of reviewing discovery documents, undertakes tasks that could otherwise be performed entirely by a machine cannot be said to engage in the practice of law.” There is a potential of some very far-reaching implications from this ruling. If doc review can…
This site uses Akismet to reduce spam. Learn how your comment data is processed.
@mikemac29 did you try Peak on iOS? #kindacool