discover

An eDiscovery Market Size Mashup: 2013-2018 Worldwide Software and Services Overview

An eDiscovery Market Size Mashup:  2013-2018 Worldwide Software and Services Overview

Taken from a combination of public market sizing estimations as shared in leading electronic discovery reports, publications and posts over time, the following eDiscovery Market Size Mashup shares general worldwide market sizing considerations for both the software and service areas of the electronic discovery market for the years between 2013 and 2018.


Four Years of Magic: The Gartner Magic Quadrant for E-Discovery Software

Four Years of Magic: The Gartner Magic Quadrant for E-Discovery Software

Published annually by Gartner, the Magic Quadrant for E-Discovery Software is a concise research report that highlights key market developments and dynamics in the field of eDiscovery and provides an comparative evaluation of leading eDiscovery software vendors. An aggregation from public domain sources of eDiscovery vendors who have been selected and evaluated as part of the annual Magic Quadrant for E-Discovery Software since 2011 is provided for your review and consideration.


Considering Marketing? Strategic, Operational and Tactical Considerations

Considering Marketing? Strategic, Operational and Tactical Considerations

Organizations that achieve and maintain strategic, operational and tactical marketing alignment can significantly increase the influence their organization has on their target market.


A List from Lists: 20+ Enterprise Content Management Vendors

A List from Lists: 20+ Enterprise Content Management Vendors

Based on a compilation of research from analyst firms and industry expert reports in the enterprise content management arena, the following “20+ Vendor” list provides a short listing that may be useful in the consideration of enterprise content management vendors.


eDiscovering the Inc. 5000: A Look at eDiscovery Providers in the 2013 List

eDiscovering the Inc. 5000: A Look at eDiscovery Providers in the 2013 List

In 1982, Inc. Magazine began showcasing 500 of the fastest-growing privately held companies in the United States and publishing them as part of an Inc. 500 listing.  Twenty-five years later the showcase list was expanded to include 5,000 companies and rechristened  as the Inc. 5000.  This year’s Inc. 5000 list contains a variety of national […]


Three Years of Magic: The Gartner Magic Quadrant for E-Discovery Software

Three Years of Magic: The Gartner Magic Quadrant for E-Discovery Software

Published annually by Gartner, the Magic Quadrant for E-Discovery Software is a concise research report that highlights key market developments and dynamics in the field of eDiscovery and provides an comparative evaluation of leading eDiscovery software vendors. An aggregation from public domain sources* of eDiscovery vendors who have been selected and evaluated as part of the annual Magic Quadrant for E-Discovery Software since 2011 is provided for your review and consideration.


PII, Presentism and Persistence: The Enron Data Set

PII, Presentism and Persistence: The Enron Data Set

Based on an aggregation of online content from eDiscovery commentators ranging from legal experts to technology practitioners, provided below is a non-all inclusive overview of recent articles, comments and posts in regard to the presence of personally identifiable information (PII) in the EDRM Enron Email Data Set. This overview includes a chronological overview of online articles, comments and posts as well as a listing of the individuals and entities references in the online articles, comments and posts.


Focus, Influence, Frequency and Synchronization: Considering Social Media

Focus, Influence, Frequency and Synchronization: Considering Social Media

In today’s “sound-bite” environment in which professional organizations compete for client attention through a variety of conduits and communications, it is increasingly important for marketing and sales leaders to consider and coordinate the use of all communications and communications tools in order to maximize impact and influence on potential clients.


More eDiscovery Cowbell?

More eDiscovery Cowbell?

Being a fan of both “More Cowbell” and key “twitterers” and also being aware of the twitter phenomenon of “follow fridays”, I thought it appropriate and fun to begin sharing once a week on Friday a list of five “twitterers” who I believe “bring more cowbell” to those interested in news, views, and events surrounding the topic of electronic discovery. Bringing “More Cowbell” is a very good thing in my mind – and I hope you enjoy the writings and rants of those featured as a weekly “@ComplexD Cowbeller”.


Around the Twittersphere: eDiscovering Vendors on Twitter

Around the Twittersphere: eDiscovering Vendors on Twitter

Based on a website review of leading providers influencing the electronic discovery arena, the following list provides a quick, non-all inclusive reference of eDiscovery and eDiscovery-related (fron business intelligence to social media archiving) vendors who have ventured into the “Twittersphere” and have a company specific Twitter feed.


Good Practice Guide to eDiscovery in Ireland

Good Practice Guide to eDiscovery in Ireland

Authored by the eDiscovery Group of Ireland, the Good Practice Guide to Electronic Discovery in Ireland is designed to present a practical and reasonable approach to assist those who must meet the challenges of discovery of ESI within the jurisdiction of Ireland.


An Update: Peck, Parties and Predictive Coding

An Update: Peck, Parties and Predictive Coding

Updated 10/08/2013: From descriptions to discussions to diatribes, many individuals and organizations have attempted to inform and influence opinion in regard to the recent predictive coding related transcripts, objections, declarations, opinions and orders in the matter of Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279 (ALC) (AJP) (S.D.N.Y).


The eDisclosure Systems Buyers Guide – 2013 Edition

The eDisclosure Systems Buyers Guide - 2013 Edition

Authored by litigation support expert Andrew Haslam of U.K. based Allvision Computing, the The eDisclosure Systems Buyers Guide – 2013 Edition, provides an overview of key technology considerations, industry approaches and vendor capabilities regarding the discipline of eDisclosure (eDiscovery).


Considering Machine Learning: Three References

Considering Machine Learning: Three References

With the increased focus within the discipline of eDiscovery on Technology-Assisted Review, three references are provided to help legal professionals establish a solid base of definitional and contextual information for considering machine learning.


Data Mining: Risks of Friendships on Social Networks

Data Mining: Risks of Friendships on Social Networks

“Risks of Friendships on Social Network” offers unique insight into the privacy risks of online friendships and provides salient considerations for the development of risk models that could be applied to social network users.


Fifty Top Providers: A Short eDiscovery List

Fifty Top Providers: A Short eDiscovery List

Based on a compilation of research from five leading analyst firms in the electronic discovery arena, the following “Top 50″ list provides a short listing of fifty electronic discovery providers.


Designing Search Systems: Churn, Real-Time Search and Twitter

Designing Search Systems:  Churn, Real-Time Search and Twitter

A Study of “Churn” in Tweets and Real-Time Search Queries (Extended Version)” offers unique insight into the temporal dynamics of term distribution which may hold implications the design of search systems. As the growing importance of real-time search brings with it several information retrieval challenges; this paper frames one such challenge, that of rapid changes to term distributions, particularly for queries.


Contribution, Conceit and Crying: Considering the Perceived Value of Tweets

Contribution, Conceit and Crying:  Considering the Perceived Value of Tweets

“Conventional wisdom exists around these questions [of what content do Twitter users value and why are some tweets valued more than others], but to our knowledge this is the first work to rigorously examine whether the commonly held truths are accurate.” Authors – Paul Andre (Carnegie Mellon University), Michael Bernstein (MIT) and Kurt Luther (Georgia Institute of Technology).


Dialogue, Experts, and Social Media

Dialogue, Experts, and Social Media

The ILTA Annual Conference yearly provides attendees with an excellent forum for considering ideas and innovation centered around the legal profession. Last year’s “Strategic Unity” themed event was no exception – with one of the most interesting areas of discussion being the growth of professional communications through the medium of social media.


The Emotions and Logic of Behavioral Influence

The Emotions and Logic of Behavioral Influence

In order to influence a customer, it is prudent to first become familiar with the components of customer behavior. There are both emotional and logical elements to client decisions –– and the impact of these elements changes over time.


Tools for Online Fools

Tools for Online Fools

Traditionally, organizations have sought to influence users through a combination of print and online materials shared directly by sales team members in face-to-face encounters. However, with the advent and acceptance of social media, organizations can now move a significant portion of conventional face-to-face encounters to an online environment –– a movement that can speed the sharing and collaboration between influencers and those being influenced.


Social Media Risk?

Social Media Risk?

Simple, high level depiction of eleven social media risks, the origination of the risks, and the potential costs associated with the risks. Based on Gartner Research by Andrew Walls on “How to Win Arguments About the Security of Social Software” (G00173953) published in February of 2010.


Data Breaches, Social Media, and Symantec

Data Breaches, Social Media, and Symantec

Last week I had an excellent opportunity to learn from Symantec’s Director of Product Marketing – David Dorosin – about both Targeted Attacks on Intellectual Property and how Symantec is providing new tools to help address the challenges of these attacks. This conversation was of special interest to me as it provided an opportunity for me to see how leading security vendors are beginning to address the data breach challenges associated with unconventional unstructured data emanating from social media.