eDJ Quick Analysis: IBM To Acquire StoredIQ
IBM made a commitment to the unstructured Big Data management challenge today, announcing its intent to acquire StoredIQ (SIQ). The price of the acquisition was not disclosed. Nowhere is the...
View ArticleNew eDJ Group Report Available: Defensible Deletion Topic Overview
Throughout 2012, a not-so-new concept began to surface in earnest: deletion of information. eDJ’s consultants have supported expiry initiatives for years, but until 2012 few corporate counsel and IT...
View ArticleStudy: Most Unprepared for eDiscovery Requests – Channelnomics
Study: Most Unprepared for eDiscovery RequestsChannelnomicsMost organizations are pragmatic at implementing basic, no-frills security strategies — but specialized solutions such as eDiscovery and...
View ArticleAre unstable backup tapes a real problem?
I recently hit a snag during a migration project when a client’s back up tapes could not be restored due to physical tape failure. At the time I thought, “here we go again, unreliable tape backup”....
View ArticleBYOD policy – Charting a good path to higher ground
This is just a cross-post to a piece of mine that we’ve published on the Hicks Morley website. Here’s a link and a teaser: The desire for using personal mobile devices to undertake work has risen like...
View ArticleMore than half of in-house counsel say data security is their top legal concern
As more companies face cybercrime threats, law departments seek data protection tips When shoppers swiped their credit and debit cards to pay for purchases at Barnes & Noble stores last year, they...
View ArticleIf You Fail to Implement Your Information Retention Plan, Then You Plan to Fail
There is little doubt about the value of information to businesses of all sizes. In fact, some of our recent research found that worldwide spending on business information is $1.1 Trillion – enough...
View ArticleNew Article: Does Your Firm Have a Bring-Your-Own-Device Policy?
My latest ABA Journal tech column is called “Does Your Firm Have a Bring-Your-Own-Device Policy?” The column is just a simple introduction to the two main approaches to the increasingly-common desire...
View ArticleGovernment limits use of external drives, to avoid data breaches
Here is a link to an interesting Postmedia article on how HRSDC is moving to limit use by employees of portable data devices, following several incidents in which external drives containing Canadians’...
View ArticleSometimes the best defense is deletion
Information Governance experts say that while storage coast are down, there's risk -- and cost -- associated with the growing 'data lake' Big Data is viewed as a very good thing by most enterprises....
View ArticleThe #Obama Administration’s RM Initiative – What Does It Mean to You?
I recently did a webinar with Sue Trombley from Iron Mountain on the impact of the Obama Administration's records management initiative -- not just on the federal government, but on records management...
View ArticleThe Thrills Of E-Discovery – Techdirt
The Thrills Of E-DiscoveryTechdirtWe're never going back to sorting through those boxes of documents in that proverbial warehouse. New amendments to the FRCP specifically dealing with e-discovery...
View ArticleBarry Murphy’s LegalTech 2013 Wrap Up
Another year, another LegalTech New York. But 2013’s LTNY was not just a regular old conference; rather, this year’s show was marked by high energy and a positive vibe. Overall, the biggest theme that...
View ArticleLegalTech Report: ‘TitanFile’ Secure Cloud Sharing
[Another in a series of mini-reports on what I saw at the annual LegalTech conference in New York this week.] TitanFile is a SaaS file-sharing service – in the vein of Dropbox or Box – but designed for...
View ArticleYahoo Requires Warrants for E-Mail Searches of Its Users
Two days after Google announced they would require warrants for e-mail searches of their user’s accounts, Yahoo matched the policy leaving the other major consumer-facing e-mail...
View ArticleCalling General Counsel to the Front Lines of Cybersecurity
As President Obama studies how the U.S. military should respond to an increasing number of cyber attacks against public and private institutions, general counsel would be wise to examine their own...
View ArticleGoogle Calls for Greater Protections for Electronic Mail
Each year, January 28th marks Data Privacy Day. This is considered to be a day to empower and educate individuals into protecting their online privacy and protection of data. Internet giant Google...
View ArticleeDiscovery: Businesses Continue to Struggle with Information Retention –...
eDiscovery: Businesses Continue to Struggle with Information RetentionFormtek Blog (blog)It's another year and time for another survey to report that most organizations have data retention programs...
View ArticleThe Interdependence of Data Governance and eDiscovery
Two forces are at work in corporations that have a significant bearing on eDiscovery: volumes of data are increasing at an astonishing rate and emerging eDiscovery technologies are making it possible...
View Article#Bigdata and the Challenge of Extreme Information
Big data and the challenge of extreme information from John Mancini
View Article
More Pages to Explore .....