eDiscovery

The Future of AI Models

In eDiscovery, the use of AI is typically found in predictive coding or active learning technology, which has given case teams a huge leap forward in the review stage. However, AI can't work on its own. Technology like this needs human input to be trained properly. ...

A Deep Dive on 7 Language Translation Tools

We’re committed to finding the best legal technology for our customers. Considering that so many matters have a foreign language component these days, we thought it was time we take a deep dive into what the market had to offer in terms of machine translation. ...

Q3 2020 Headliners

A few big things happened this quarter that we feel deserve another mention: privilege analytics, social media collection, and a new RegEx tool for Relativity. Here’s a quick overview of each and why you’ll want to know about them....

Internal Risks

72% of departing CEOs take intellectual property (IP) with them. In order to prevent a data breach (with the source being your own organization), there must be a contingency plan in place....

How to Safely Take In Bad Data

What should you do if you have data that you’re afraid of? What is the best way to disinfect it? Build an Airlock. Here's how to do it, with no risk to your other data or networks....

The Path to Self-Worth

Christine Porras, our Director of Technology Solutions, shares her personal story of finding self-worth in response to our eDiscovery Unredacted women's panel. ...

Strategies for Breach Prevention

With so little control over files and client data being passed back and forth through email, how can law firms take control of their data to avoid a breach? Our COO, Sal Dababneh, sat with Richard Rodney & Brian Dykstra to discuss strategies for breach prevention....

How to Provide Maximum Security for Remote Users

This year has, thus far, tested the bricks in the foundation of many organizations in our industry. Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users. ...