Organizations that achieve and maintain strategic, operational and tactical marketing alignment can significantly increase the influence their organization has on their target market.
Based on a compilation of research from analyst firms and industry expert reports in the enterprise content management arena, the following “20+ Vendor” list provides a short listing that may be useful in the consideration of enterprise content management vendors.
In 1982, Inc. Magazine began showcasing 500 of the fastest-growing privately held companies in the United States and publishing them as part of an Inc. 500 listing. Twenty-five years later the showcase list was expanded to include 5,000 companies and rechristened as the Inc. 5000. This year’s Inc. 5000 list contains a variety of national […]
Published annually by Gartner, the Magic Quadrant for E-Discovery Software is a concise research report that highlights key market developments and dynamics in the field of eDiscovery and provides an comparative evaluation of leading eDiscovery software vendors. An aggregation from public domain sources* of eDiscovery vendors who have been selected and evaluated as part of the annual Magic Quadrant for E-Discovery Software since 2011 is provided for your review and consideration.
Beginning in early 2012 the topic of Technology-Assisted Review moved from expert-led explanations to mainstream mentions in legal community articles, opinions, surveys and reports. Provided for your research, review and consideration are a compilation of key headlines and links from online sources on the topic of Technology-Assisted Review from February, 2012, until now.
Based on an aggregation of online content from eDiscovery commentators ranging from legal experts to technology practitioners, provided below is a non-all inclusive overview of recent articles, comments and posts in regard to the presence of personally identifiable information (PII) in the EDRM Enron Email Data Set. This overview includes a chronological overview of online articles, comments and posts as well as a listing of the individuals and entities references in the online articles, comments and posts.
In today’s “sound-bite” environment in which professional organizations compete for client attention through a variety of conduits and communications, it is increasingly important for marketing and sales leaders to consider and coordinate the use of all communications and communications tools in order to maximize impact and influence on potential clients.
Being a fan of both “More Cowbell” and key “twitterers” and also being aware of the twitter phenomenon of “follow fridays”, I thought it appropriate and fun to begin sharing once a week on Friday a list of five “twitterers” who I believe “bring more cowbell” to those interested in news, views, and events surrounding the topic of electronic discovery. Bringing “More Cowbell” is a very good thing in my mind – and I hope you enjoy the writings and rants of those featured as a weekly “@ComplexD Cowbeller”.
Based on a website review of leading providers influencing the electronic discovery arena, the following list provides a quick, non-all inclusive reference of eDiscovery and eDiscovery-related (fron business intelligence to social media archiving) vendors who have ventured into the “Twittersphere” and have a company specific Twitter feed.
Authored by the eDiscovery Group of Ireland, the Good Practice Guide to Electronic Discovery in Ireland is designed to present a practical and reasonable approach to assist those who must meet the challenges of discovery of ESI within the jurisdiction of Ireland.
Updated 10/08/2013: From descriptions to discussions to diatribes, many individuals and organizations have attempted to inform and influence opinion in regard to the recent predictive coding related transcripts, objections, declarations, opinions and orders in the matter of Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279 (ALC) (AJP) (S.D.N.Y).
Authored by litigation support expert Andrew Haslam of U.K. based Allvision Computing, the The eDisclosure Systems Buyers Guide – 2013 Edition, provides an overview of key technology considerations, industry approaches and vendor capabilities regarding the discipline of eDisclosure (eDiscovery).
With the increased focus within the discipline of eDiscovery on Technology-Assisted Review, three references are provided to help legal professionals establish a solid base of definitional and contextual information for considering machine learning.
“Risks of Friendships on Social Network” offers unique insight into the privacy risks of online friendships and provides salient considerations for the development of risk models that could be applied to social network users.
Based on a compilation of research from five leading analyst firms in the electronic discovery arena, the following “Top 50″ list provides a short listing of fifty electronic discovery providers.
A Study of “Churn” in Tweets and Real-Time Search Queries (Extended Version)” offers unique insight into the temporal dynamics of term distribution which may hold implications the design of search systems. As the growing importance of real-time search brings with it several information retrieval challenges; this paper frames one such challenge, that of rapid changes to term distributions, particularly for queries.
“Conventional wisdom exists around these questions [of what content do Twitter users value and why are some tweets valued more than others], but to our knowledge this is the first work to rigorously examine whether the commonly held truths are accurate.” Authors – Paul Andre (Carnegie Mellon University), Michael Bernstein (MIT) and Kurt Luther (Georgia Institute of Technology).
The ILTA Annual Conference yearly provides attendees with an excellent forum for considering ideas and innovation centered around the legal profession. Last year’s “Strategic Unity” themed event was no exception – with one of the most interesting areas of discussion being the growth of professional communications through the medium of social media.
In order to influence a customer, it is prudent to first become familiar with the components of customer behavior. There are both emotional and logical elements to client decisions –– and the impact of these elements changes over time.
Traditionally, organizations have sought to influence users through a combination of print and online materials shared directly by sales team members in face-to-face encounters. However, with the advent and acceptance of social media, organizations can now move a significant portion of conventional face-to-face encounters to an online environment –– a movement that can speed the sharing and collaboration between influencers and those being influenced.
Simple, high level depiction of eleven social media risks, the origination of the risks, and the potential costs associated with the risks. Based on Gartner Research by Andrew Walls on “How to Win Arguments About the Security of Social Software” (G00173953) published in February of 2010.
Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.