chronology

LegalTech® NY 2015 Vendor Note: A Look At e-Lucidata Solutions

LegalTech® NY 2015 Vendor Note: A Look At e-Lucidata Solutions

Based in proximity to New York City, e-Lucidata is a consultancy focused on delivering solutions in the areas of information governance, e-Discovery and professional services. One unique offering provided by e-Lucidata is their Engineered Review. Simply stated, Engineered Review is a more proactive version of Managed Review that applies automation to manual processes leading to improved quality control (QC) and increased client satisfaction. This increased client satisfaction arises from the advent of a more predictable and consistent litigation budget for time and spend.


Information Governance Revisited

Information Governance Revisited

McKinnon and her colleagues suggest that we view information governance “as a corporate objective, enabled by programs, projects, priorities, people and technology.” This aligns well with my recommendation to take a strategic approach to information governance.


Thinking Through the Implications of CAL: Who Does the Training?

Thinking Through the Implications of CAL: Who Does the Training?

It’s when you can combine the advantages of continuous learning with the flexibility that non-expert training gives you that TAR really starts to come alive. CAL means a lower total number of documents reviewed. Non-expert training means flexibility about how and when you can start the process, not to mention the ability to be massively parallel and cut down total elapsed clock time. Instead of having to wait, as you do in SAL and SPL, for your expert to have free time in order to train documents, with these two busted Myths you can hit the ground running, and be done long before your SPL or SAL may have even started.


Florida Bar Winter Meeting: Craig Ball on Electronic Evidence Challenges

Florida Bar Winter Meeting: Craig Ball on Electronic Evidence Challenges

Legal Talk Network Producer Laurence Colletti interviews electronic evidence expert Craig Ball at the 2015 Winter Meeting of The Florida Bar. Ball discusses the limitations of electronic search tools and how lawyers need to move past the delusion of the right keywords yielding perfect results.


Throwback Thursday: Does the emperor have any clothes on? The EDRM and XML2

Throwback Thursday: Does the emperor have any clothes on? The EDRM and XML2

Does the emperor have any clothes on? Thoughts on the EDRM – This is the first in a three-part series of “Throwback Thursday” posts that highlight ideas and opinions of announcements and reports from times past. These posts provide legal technology professionals an opportunity to consider current eDiscovery activities through the lens of yesterday’s thoughts.


LegalTech® NY 2015 Vendor Note: A Visual Classification Update

LegalTech® NY 2015 Vendor Note: A Visual Classification Update

BeyondRecognition will be highlighting its visual classification technology during LegalTech throughout the week of February 3-5, 2015, in New York City. Provided in this post is a selected group of questions for technology-assisted review vendors and experts that serve to highlight the challenges of text-based systems.


Bridging the Consumption Gap in Legal Technology

Bridging the Consumption Gap in Legal Technology

There are two steps to realign the industry to focus on value instead of three piles. First, look at where the money is being spent and determine how to get more value from less money. Second, recognize that law firms’ and vendors’ support structures do not increase the value of e-discovery.


Explaining Complexities in eDiscovery (Cartoon and Clip)

Explaining Complexities in eDiscovery (Cartoon and Clip)

Daily we read, see and hear more and more about the technologies, tactics and terms of eDiscovery. This week’s cartoon and clip highlights the importance for eDiscovery practitioners and commentators to share their facts, ideas and opinions in an understandable manner (cartoon) and provides a link to one of the most informative and understandable blogs on eDiscovery by industry expert Craig Ball (clip).


42-Seconds to Understand Visual Document Classification

42-Seconds to Understand Visual Document Classification

If you can spare less than a minute to learn about this impressive new technology, this is a 42-second animation that describes how visual classification works and how it can help your organization launch and complete classification-dependent initiatives like assigning retention and disposition schedules, file share remediation, archive digitization, content migration, and silo consolidation.


Two-Filter Document Culling – Part One

Two-Filter Document Culling – Part One

Large document review projects can maximize efficiency by employing a two-filter method to cull documents from costly manual review. This method helps reduce costs and maximize recall.


LegalTech® NY 2015 Vendor Note: A Lexbe Update

LegalTech® NY 2015 Vendor Note: A Lexbe Update

Lexbe will be highlighting its complete portfolio of eDiscovery offerings during LegalTech throughout the week of February 3-5, 2015, at the London Hotel in New York City. Provided in this post is one unique differentiator the Lexbe Team will be sharing with potential clients during LegalTech. That differentiator is the speed and effectiveness of the Lexbe Processing Systems.


LegalTech® NY 2015 Vendor Note: A BeyondReview Update

LegalTech® NY 2015 Vendor Note: A BeyondReview Update

BeyondReview will be highlighting its recently announced eDiscovery offering during LegalTech throughout the week of February 3-5, 2015, at the London Hotel in New York City. Provided below is a short update on the unique approach and differentiation the BeyondReview Team will be sharing with potential clients during LegalTech.


What CENTCOM Can Teach You About Cloud Security

What CENTCOM Can Teach You About Cloud Security

Individuals calling themselves the “CyberCaliphate” hacked into the Twitter feed for the U.S. military’s Central Command last week, and for 40 minutes posted photos, links, and videos before the account was shut down. They also gained access to Central Command’s YouTube profile, updating the banner image and posting Islamic State propaganda videos. While no confidential or top secret information was stolen, and hackers did not gain access to the U.S. Department of Defense’s network, the incident illustrates the risks government agencies face as they increasingly rely on cloud services to fulfill their mission and communicate with the outside world.


Podcast: The Government’s Dark Data: A Decade of Discovery

Podcast: The Government’s Dark Data: A Decade of Discovery

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Jason Baron about information governance, dark data, open government, and his role in The Decade of Discovery. Baron talks about the increasing amount of electronic data affecting the Freedom of Information Act (FOIA) and the discussion e-discovery experts need to have about providing public access to government records.


2014 Year-End E-Discovery Update

2014 Year-End E-Discovery Update

By Gibson Dunn In our Mid-Year E-Discovery Update , we reported that 2014 was shaping up to be the “year of technology” in e-discovery. The remainder of the year more than lived up to those expectations. Powerful new data analytics tools have become available for search and review, predictive coding pricing is becoming more accessible […]


Technology-Assisted Review: Are We All In Agreement? (Cartoon and Clip)

Technology-Assisted Review: Are We All In Agreement? (Cartoon and Clip)

Daily we read, see and hear more and more about the many technology approaches, quality control measures and defensibility risks associated with technology-assisted review. This week’s cartoon and clip highlights the importance of agreement among industry leaders on key technology-assisted review issues (cartoon) and provides a short list of recent articles that advise caution in blindly agreeing with vendor and thought leader assertions (clip).


IP Rights in Big Data

IP Rights in Big Data

While there are legitimate concerns about finding IP in data, because data may be an inert lump of code, bits, or pieces of information, it is worthwhile to think about the different kinds of IP that arise in conjunction with and in the context of Big Data.


Every Form of Recall Has Its Price

Every Form of Recall Has Its Price

by Herbert L Roitblat, Ph.D. When considering the measurement of eDiscovery accuracy, there are many alternatives available. As I have said elsewhere , measurement of eDiscovery accuracy is a critical enterprise, but the pendulum may have swung too far toward complex measurement. We should not let our concern about measurement overwhelm our process. The most […]


eDiscovery Challenges: Challenges Faced By Intellectual Property Litigators

eDiscovery Challenges: Challenges Faced By Intellectual Property Litigators

Intellectual Property litigation presents a number of unique discovery and review challenges for the involved attorneys, law firms, and in-house counsel, corporations and organizations. Legal issues can require analysis not only of patent, copyright and trademark law, but complex contract and joint venture, development and entity issues. Also modern IP cases often are international in scope. The subject matter being disputed in IP cases can be highly variable, with litigation spanning industries like biotechnology and pharmaceuticals to electronics manufacturing and advanced software algorithms.


Introducing “ei-Recall” – A New Gold Standard for Recall Calculations in Legal Search – Part Three

Introducing “ei-Recall” – A New Gold Standard for Recall Calculations in Legal Search – Part Three

First Example of How to Calculate Recall Using the ei-Recall Method: Here we assume a review project of 100,000 documents. By the end of the search and review, when we could no longer find any more relevant documents, we decided to stop and run our ei-Recall quality assurance test. We had by then found and verified 8,000 relevant documents, the True Positives .


A New Model for Cloud Maturity

A New Model for Cloud Maturity

According to a recent Cloud Security Alliance survey on cloud adoption practices and trends , large companies have more mature governance practices than their smaller peers. But across the board, fewer than half of companies surveyed have implemented controls like acceptable use policies for cloud, security awareness training programs, and cloud governance committees to create policies and monitor enforcement. Today, 72% of companies don’t even know the scope of shadow IT at their companies, but the majority understand shadow IT is not going away and must be managed.


DESI VI Workshop on Machine Learning in E-Discovery & Information Governance

DESI VI Workshop on Machine Learning in E-Discovery & Information Governance

The DESI VI workshop aims to bring together researchers and practitioners to explore innovation and the development of best practices for application of search, classification, language processing, data management, visualization, and related techniques to institutional and organizational records in e-discovery, information governance, public records access, and other legal settings.


A TAR is Born: Continuous Active Learning Brings Increased Savings While Solving Real-World Review Problems

A TAR is Born: Continuous Active Learning Brings Increased Savings While Solving Real-World Review Problems

In July 2014, attorney Maura Grossman and professor Gordon Cormack introduced a new protocol for Technology Assisted Review that they showed could cut review time and costs substantially. Called Continuous Active Learning (“CAL”), this new approach differed from traditional TAR methods because it employed continuous learning throughout the review, rather than the one-time training used by most TAR technologies.


Soon you’ll get paid to Facebook. Sort of…

Soon you’ll get paid to Facebook. Sort of…

How would you like to get paid to use Facebook, Inc.? Sounds like a dream come true, doesn’t it? Well it’s coming. Let me clarify…