Remove Computer and Electronics Remove Conference Remove Education Remove Webinar
article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. The first is forensic images of computers and cell phones.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. And although we have seen ample evidence that computers are faster than humans, speed may not always equate to accuracy. The proportionality issue is an important one.

article thumbnail

Tom O’Connor of the Gulf Coast Legal Technology Center: eDiscovery Trends 2018

eDiscovery Daily

They go to conferences for particular reasons. As part of that, I think some of the people who have attended LTNY before are being siphoned off due to the rise of really good user group conferences, like Relativity Fest. I think a lot of people are choosing those user group conferences instead. Or an AI session.

GDPR 39
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology. Keyboard app vulnerabilities reveal keystrokes to network eavesdroppers Security researchers have identified critical security vulnerabilities in Cloud-based pinyin keyboard apps from Baidu, Inc., Data breached: <1 billion people’s data.