Profile cover photo
Profile photo
Rob Robinson
1,729 followers -
Technology Marketing and Management
Technology Marketing and Management

1,729 followers
About
Rob's interests
View all
Rob's posts

Post has attachment
“Move over, managers, there’s a new boss in the office: artificial intelligence.”

Post has attachment
“The resulting acquisition of Yahoo by Verizon, negotiated over several months, may be the first time a merger price has been discounted because of a data breach, said Craig A. Newman, a global cybersecurity partner at Patterson Belknap Webb & Tyler in New York.”

Post has attachment
“Who is driving the bus when it comes to the e-discovery budget, vetting the vendors, negotiating pricing, the passing of the baton from one vendor to the next, everyone hitting their deadlines and the quality of the work?”

Post has attachment
“E-discovery increasingly involves very large volumes of potentially sensitive data, and multiple organizations may play a role in processing, hosting, review and production of documents,” said George Socha, EDRM co-founder. “It’s critical that decision makers assess the security capabilities of e-discovery providers, and the questionnaire was designed to guide that assessment.”

Post has attachment
“Companies pursuing innovation and agility are now investing in trust as a competitive differentiator.” http://buff.ly/2mjdLKe

Post has attachment
“These awards recognize 24 firms and over 200 authors (from among more than 40,000) who published their excellent thought leadership on JD Supra in 2016. In each category, we honor ten authors and one firm. CloudNine was highlighted as the top eDiscovery Firm and Doug Austin as a Top eDiscovery Author.” http://buff.ly/2nes9Xe
Photo

Post has attachment
“We offer this information for free on this [e-Discovery Team] blog to encourage as many people as possible in this industry to get on the AI bandwagon. Predictive coding is based on active machine learning, which is a classic, powerful type of Artificial Intelligence (AI). Our Predictive Coding 4.0 method is designed to harness this power to help attorneys find key evidence in ESI quickly and effectively.”

Post has attachment
“Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches.”

Post has attachment
“The Security Audit Questionnaire was designed primarily to help evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services.”

Post has attachment
“With regard to intent, the Court noted that the plaintiff/appellant “deleted 41,000 files from his laptop in December 2014 in the face of two litigation hold notices, one of which he issued, and an expedited discovery order that permitted Elting to conduct forensic discovery of Shawe’s laptop.””
Wait while more posts are being loaded