Tag Archives: E-Mail Management

Big email: How to effectively find the needle in the haystack (Part 2)

Big email: How to effectively find the needle in the haystack (Part 2). via Big email: How to effectively find the needle in the haystack (Part 2).

Posted in Data, Data Mapping, Production Tools & Tips, Search, The Industry | Tagged , , , , , , , , , | Leave a comment

Big email: How to effectively find the needle in the haystack (Part 1)

Big email: How to effectively find the needle in the haystack (Part 1). via Big email: How to effectively find the needle in the haystack (Part 1).

Posted in Data, Litigation, Production Tools & Tips, Search, The Industry | Tagged , , , , , , | Leave a comment

Ghost-Hunting With Anti-Virus | FireEye Blog

Ghost-Hunting With Anti-Virus | FireEye Blog. via Ghost-Hunting With Anti-Virus | FireEye Blog.

Posted in Data, Network Control, Open Source, Privacy, Security | Tagged , , , , , , , , , , , , , | Leave a comment

The absurdly simple guide to backing up your PC | ITworld

The absurdly simple guide to backing up your PC | ITworld. via The absurdly simple guide to backing up your PC | ITworld.

Posted in Best Practices, Data, Production Tools & Tips, The Industry | Tagged , , , , , , , , , , , | Leave a comment

The Heartbleed Hit List: The Passwords You Need to Change Right Now

The Heartbleed Hit List: The Passwords You Need to Change Right Now. via The Heartbleed Hit List: The Passwords You Need to Change Right Now.

Posted in Best Practices, Data, Network Control, Privacy, Production Tools & Tips, Security | Tagged , , , , , , | Leave a comment

CSOs must adopt new risk management trends

CSOs must adopt new risk management trends. via CSOs must adopt new risk management trends.

Posted in Data Mapping, Litigation, Network Control, Privacy, Production Tools & Tips, Security, Uncategorized | Tagged , , , , , , , , , , | Leave a comment

3 steps to becoming a “predictive coding guru”

3 steps to becoming a “predictive coding guru”. via 3 steps to becoming a “predictive coding guru”.

Posted in Best Practices, Data, Data Mapping, Litigation, Predictive Coding, Production Tools & Tips, The Industry | Tagged , , , , , , , , , , , | Leave a comment

Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes

Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes. via Florida Supreme Court Juices Up E-Discovery Requirements : E-Discovery Bytes.

Posted in Best Practices, Data, Data Mapping, Litigation, Network Control, Predictive Coding, Privacy, Production Tools & Tips, Search, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes

Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes. via Data Deluge: The Problem Is, You Can’t Keep Everything – Forbes.

Posted in Best Practices, Data, Data Mapping, Litigation, Network Control, Privacy, Production Tools & Tips, Search, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , , | Leave a comment

Technology: A practical approach to open source software licensing

Technology: A practical approach to open source software licensing. via Technology: A practical approach to open source software licensing.

Posted in Best Practices, Data, Data Mapping, Network Control, Open Source, Production Tools & Tips, Security, The Industry | Tagged , , , , , , , , , , , , , , , , , | Leave a comment