Shared Links (weekly) May 9, 2021

Shared Links (weekly) May 9, 2021

Shared Links (weekly) Oct. 18, 2020

Shared Links (weekly) Oct. 18, 2020

More Questions about Ediscovery People are too Afraid to Ask

Blatant Hypocrite Ajit Pai Decides To Move Forward With Bogus, Unconstitutional Rulemaking On Section 230

Oregon FBI Tech Tuesday: Cyber Security Awareness Month

Making it personal: The effects of alcohol and substance abuse in the legal community

The Disgruntled Employee and the Damage They Can Do

Why Lawyers Need to Use Multi-Factor Authentication

Launching Today: A Global Directory of Legaltech Products and Resources

TikTok Toe: Tackling Ediscovery for the New Kid on the Social Media Block

Let’s talk about mental health in the workplace

Why You Shouldn’t Believe Everything You See on Social Media

Preventing Employee Burnout Among Remote Workers

How to help an employee with an anxiety disorder

Always Check the Facts Before You Share the Story

What I’m Sharing (weekly) Aug 16, 2020
|

What I’m Sharing (weekly) Aug 16, 2020

A New Model for Cybersecurity? NIST Details Framework for Zero Trust Architecture Teams Are More Productive When They Don’t Work Off Hours Why You Still Need to Take Time Off in a Time of Crisis The Fox in the e-Discovery Henhouse: Judge Slams Self-Collection Happy Birthday to the PC: Either the Best or Worst Thing…

What I’m Sharing (weekly)

What I’m Sharing (weekly)

‘Too Practical’? Why Some Law Schools Don’t Offer E-Discovery Education ILTACON 2019 at the Happiest Place on Earth How to Be a Better, Kinder Professional Here’s an eDiscovery Buyers Guide Where You Can Actually See Videos of the Products 3 Ways Proactive Legal Ops Teams Can Increase Organizational Efficiency 57 Tips for Successful Innovation Outcomes…

What I’m Sharing (weekly)

What I’m Sharing (weekly)

Overview of the Advanced eDiscovery solution in Microsoft 365 Lawyers Are In the Information Business. Get Over It The Document Demand That Seeks Electronically Stored Information – How to ask for #ediscovery Who’s to blame for ransomware attacks — beyond the attackers? How to See if Zoom Is Running a Secret Web Server on Your…