What I’m Sharing (weekly)
|

What I’m Sharing (weekly)

Google Has a Plan to Disrupt the College Degree?This is pretty interesting, could work, if we can get orgs to see it as “qualified”. Would open a ton of doors.
Toward a Zoom agreement?”The purpose of a meeting is not to fill the allocated slot on the Google calendar invite. The purpose is to communicate an idea and the emotions that go with it, and to find out what’s missing via engaged conversation. If we can’t do that, let’s not meet.”
Report: AI Company Leaks Over 2.5M Medical Records
The Intersection of E-Discovery and Cybersecurity: You’ve Come a Long Way, Baby
Think You Don’t Need to Preserve Slack Data for Discovery? Think Again
There is No Such Thing as a Free Lunch in Legal Tech
Non-Lawyer Ownership Doesn’t Guarantee More A2J?The $$ barrier to entry for someone to even be a lawyer guarantees legal services will always be expensive. #A2J will require systemic changes.
5 Best Password Managers of 2020
Surveys Show Technology Is The Key To Law Firm Success During COVID-19 And Beyond
Minimize The Risk of Data Loss From Departing Employees With These Simple Checklists

Interesting Series on eDiscovery Collections

Interesting Series on eDiscovery Collections

I spent some time reading through this series of posts on the Xact Data blog last night. While we would always take any post from a vendor about the dangerous of any organization collecting data instead of hiring an expert, for obvious reasons, (Including the one I work for) I do think they’ve provided plenty…

Linked: Worker resilience starts with manager empathy.
|

Linked: Worker resilience starts with manager empathy.

In the article below, for obvious reasons, I loved this sub-heading: The future of work is connectivity, not proximity. The ability to hire anyone who can connect to your network opens up a whole world of possible talent. But, it also comes with some adjustments that need to be made as well, and the rest…

Linked: A fake, AI-generated blog reached the top of Hacker News
| |

Linked: A fake, AI-generated blog reached the top of Hacker News

I’ve been at this blog for almost 19 years. Are you sure it’s still me writing these posts? Did I disappear and just leave it on autopilot to write posts for me long after I’m gone?

Are you sure you would know if I did?

Not everything is as it appears. We could all use a lot more skepticism, especially on topics we are already biased to believe.

What I’m Sharing (weekly) Aug 16, 2020
|

What I’m Sharing (weekly) Aug 16, 2020

A New Model for Cybersecurity? NIST Details Framework for Zero Trust Architecture Teams Are More Productive When They Don’t Work Off Hours Why You Still Need to Take Time Off in a Time of Crisis The Fox in the e-Discovery Henhouse: Judge Slams Self-Collection Happy Birthday to the PC: Either the Best or Worst Thing…

Linked: Cybersecurity: These two basic flaws make it easy for hackers to break into your systems
|

Linked: Cybersecurity: These two basic flaws make it easy for hackers to break into your systems

The results speak for themselves. “The report, based on anonymised data from real organisations that have had their networks tested, said that for 71% of companies, there’s at least one obvious weakness that could provide malicious outsiders with entry into the network.” I’ll save you the click, but you should go look at the details,…