Law firms are coming under increasing scrutiny for potentially lax security measures. Here are five easy-to-check security items, some physical, some electronic. These types of concerns will grow as the Internet of Things (IoT) grows. VOIOP Network Connections. Polycom, Cisco and other VoIP (Voice Over Internet) phones are connected to computer networks using Ethernet connectors. Unless […]

Read More

The objective of supply chain integration is to make better decisions with less risk by receiving timely information about supply and demand factors occurring up and down-stream. Ideally, this would involve IT system-level integration of companies with all their suppliers and customers for real time access to data in both directions. Unfortunately, multiple significant barriers often […]

Read More

Real property ownership is often depicted on 2-dimensional maps or plats having North-South and East-West coordinates. Two dimensions are adequate when property rights only involve surface uses of the earth or near-surface uses like easements, utility lines or cable. Two dimensions even work when mineral leases cover subsurface property rights so long as all the […]

Read More

Architectural and engineering drawings stored by an organization are often created over many years using multiple systems. However, they can be effectively managed by taking a unified approach to how they are indexed and linked. A unified approach includes a machine-based analysis of: All drawing formats, including scanned paper drawings and native CAD/CAM files. All types of […]

Read More

Glyphs can be used to consistently deconstruct, classify, and attribute large volumes of files permitting effective management of them. Deconstruction breaks files into their smallest visual elements, classification uses data visualization at the page level, and attribution selects specified glyphs or their text values from within classifications. Deconstruction The word “glyph” has several meanings. In […]

Read More

Enterprise Content Management systems enable organizations to work effectively with their unstructured content. ECM typically takes a more holistic view of an organization’s documents than e-discovery and enhances the ability to retrieve and analyze documents beyond what e-discovery is typically able to achieve. ECM classifies unstructured content, provides controlled access to it, and assigns granular […]

Read More

How organizations deal with outliers, those data points that occur where they’re not expected, provide useful insights into the culture and data maturity of those organizations. Outliers occurring in simple frequency graphs could be blips that occur at the extreme ends of the normal curve. In e-discovery, outliers can be documents flagged by analytics software […]

Read More