Every major transition period has its own unique set of risks and rewards. For corporate legal departments consolidating after mergers or acquisitions, risks include not gathering all needed documents, and not being able to integrate the gathered records into one system. The potential rewards lie in having an opportunity to use the integration budget to […]

Read More

Some parties are producing thousands of e-discovery documents and emails all bundled in a single PDF. That is clearly not how those items were ordinarily maintained and it’s certainly not reasonably useful (F.R.Civ.P 34(b)(2)(E)(ii)). Here are reasons why all-in-one PDF productions are unreasonably burdensome on the receiving party: Pages with No Text Are Invisible for […]

Read More

Many organizations manage their content using enterprise content management (“ECM”) systems like SharePoint, Office 365, FileNet, Open Text, or Documentum. These ECM systems are really databases that permit organizations to associate various classifications, tags, and descriptions (collectively, “attributes”) to the content being managed and to use those attributes to find specific documents. Parties seeking documents […]

Read More

In enterprise content management, tags are used to help find tagged documents. Tags can provide terms that don’t appear on the face of the documents or they can highlight the importance of terms that do appear. Without tags, full-text searching can result in returning large numbers of irrelevant hits while missing key documents that don’t […]

Read More

Psychologist Dr. Paul Ekman summarized his decades of ground-breaking research on nonverbal communication in his 2016 book, Nonverbal Messages: Cracking the Code. He spent years demonstrating that basic human emotions are displayed with the same facial expressions literally around the world, and his approach to cataloging individual expressions that can reinforce or contradict what a […]

Read More

Law firms are coming under increasing scrutiny for potentially lax security measures. Here are five easy-to-check security items, some physical, some electronic. These types of concerns will grow as the Internet of Things (IoT) grows. VOIOP Network Connections. Polycom, Cisco and other VoIP (Voice Over Internet) phones are connected to computer networks using Ethernet connectors. Unless […]

Read More

The objective of supply chain integration is to make better decisions with less risk by receiving timely information about supply and demand factors occurring up and down-stream. Ideally, this would involve IT system-level integration of companies with all their suppliers and customers for real time access to data in both directions. Unfortunately, multiple significant barriers often […]

Read More
The BeyondRecognition Network

the-beyondrecognition-network-of-companies