Based on a compilation of research from analyst firms and industry expert reports in the electronic discovery arena, the following “100+ Provider” list provides a short listing that may be useful in the consideration of electronic discovery providers.
In today’s “sound-bite” environment in which professional organizations compete for client attention through a variety of conduits and communications, it is increasingly important for marketing and sales leaders to consider and coordinate the use of all communications and communications tools in order to maximize impact and influence on potential clients.
Being a fan of both “More Cowbell” and key “twitterers” and also being aware of the twitter phenomenon of “follow fridays”, I thought it appropriate and fun to begin sharing once a week on Friday a list of five “twitterers” who I believe “bring more cowbell” to those interested in news, views, and events surrounding the topic of electronic discovery. Bringing “More Cowbell” is a very good thing in my mind – and I hope you enjoy the writings and rants of those featured as a weekly “@ComplexD Cowbeller”.
Authored by the eDiscovery Group of Ireland, the Good Practice Guide to Electronic Discovery in Ireland is designed to present a practical and reasonable approach to assist those who must meet the challenges of discovery of ESI within the jurisdiction of Ireland.
Updated 04/11/2013: From descriptions to discussions to diatribes, many individuals and organizations have attempted to inform and influence opinion in regard to the recent predictive coding related transcripts, objections, declarations, opinions and orders in the matter of Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279 (ALC) (AJP) (S.D.N.Y).
Authored by litigation support expert Andrew Haslam of U.K. based Allvision Computing, the The eDisclosure Systems Buyers Guide – 2013 Edition, provides an overview of key technology considerations, industry approaches and vendor capabilities regarding the discipline of eDisclosure (eDiscovery).
With the increased focus within the discipline of eDiscovery on Technology-Assisted Review, three references are provided to help legal professionals establish a solid base of definitional and contextual information for considering machine learning.
“Risks of Friendships on Social Network” offers unique insight into the privacy risks of online friendships and provides salient considerations for the development of risk models that could be applied to social network users.
Based on a compilation of research from five leading analyst firms in the electronic discovery arena, the following “Top 50″ list provides a short listing of fifty electronic discovery providers.
A Study of “Churn” in Tweets and Real-Time Search Queries (Extended Version)” offers unique insight into the temporal dynamics of term distribution which may hold implications the design of search systems. As the growing importance of real-time search brings with it several information retrieval challenges; this paper frames one such challenge, that of rapid changes to term distributions, particularly for queries.
“Conventional wisdom exists around these questions [of what content do Twitter users value and why are some tweets valued more than others], but to our knowledge this is the first work to rigorously examine whether the commonly held truths are accurate.” Authors – Paul Andre (Carnegie Mellon University), Michael Bernstein (MIT) and Kurt Luther (Georgia Institute of Technology).
The ILTA Annual Conference yearly provides attendees with an excellent forum for considering ideas and innovation centered around the legal profession. Last year’s “Strategic Unity” themed event was no exception – with one of the most interesting areas of discussion being the growth of professional communications through the medium of social media.
In order to influence a customer, it is prudent to first become familiar with the components of customer behavior. There are both emotional and logical elements to client decisions –– and the impact of these elements changes over time.
Traditionally, organizations have sought to influence users through a combination of print and online materials shared directly by sales team members in face-to-face encounters. However, with the advent and acceptance of social media, organizations can now move a significant portion of conventional face-to-face encounters to an online environment –– a movement that can speed the sharing and collaboration between influencers and those being influenced.
The gathering and use of information to help achieve personal and professional objectives has been a task executed by individuals and organizations from the beginning of time. However, with the advent of tools and technologies that can greatly accelerate this gathering/use of information, it is increasingly important that one considers not only the positive things that can be accomplished from the greater understanding derived from “increased information access”, but also considers the potential “dark side usage” of this “increased information access”.
Simple, high level depiction of eleven social media risks, the origination of the risks, and the potential costs associated with the risks. Based on Gartner Research by Andrew Walls on “How to Win Arguments About the Security of Social Software” (G00173953) published in February of 2010.
Latest Twitter posts highlighting electronic discovery and social media from Rob Robinson via @ComplexD.
Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.