


Shared Links (weekly) April 10, 2022
-
Make Clients Happy | 5 Simple Workplace Tips for Young Lawyers
-
The Geek in Review Ep. 153 – Phil Flora on What Law Firms are doing in the Battle for Talent
-
Caring for aging parents, sick spouses is keeping millions out of work
-
New Report: Only 12 Percent of Employees Are Fully Productive at Work (The Reasons Why May Surprise You) – 31 interruptions per day and 25 meetings per week?
-
Weakening end-to-end encryption would do more harm than good, IT experts warn
-
Quick Steps for Lawyers to Improve Cybersecurity and Protect Client Data
-
Outrage! Our morals did not evolve to cope with social media

Shared Links (weekly) Feb. 6, 2022
-
eDiscovery Competence is a Challenge Not Being Talked About Enough
-
Organizations neglecting Microsoft 365 cybersecurity features
-
How powerful women in tech are pushing for new work policies to prevent burnout
-
Mental Health in the ‘Next Normal’ of Work: 2022 Trends Forecast
-
The four-day work week could be coming to your office sooner than you think

Shared Links (weekly) Jan. 9, 2022
-
The NFT craze has stopped being funny– I tend to agree. Eventually, they are going to run out of the “next” sale and lots of people are going to be left holding digital “assets” that have no value at all. All while burning up a ton of energy to make it happen.
-
Court Sends Signal to Parties Who Spoliated Documents Using Ephemeral Messages
-
This New Year, why not resolve to ditch your dodgy old passwords?
-
Behind the labor shortage: physical and mental health problems

Apple’s Image Scanning Tool is, Well, Complicated
At first blush, the idea of scanning images synced up to iCloud for child sexual abuse materials against the hash list of known CSAM images seems like a good idea. As a survivor of childhood sexual abuse myself, I want tech companies to takes some initiative to deal with this issue. They also want to scan images on kids’ phones using AI to see if kids are getting into any trouble with sending or receiving sexual material. Again, that sounds like a good thing. But, as the EFF points out, this all requires a backdoor, and backdoors, once created, almost never remain used for just one purpose.
