Search for: "Metadata Systems Software" Results 421 - 440 of 532
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Mar 2011, 4:59 am by Rob Robinson
Am; Court examines Collection Protocol and Request for Protective Order – http://tinyurl.com/4o977m3 (Roland Bernier) Companies are Potentially Liable for Losing the Personal Information of Their Employees – http://tinyurl.com/4mmukax (Patrick Zeller) Computing: Ethical Shades of Gray – http://tinyurl.com/5tacxz2 (Devika Kewarlramani) Deciding On the Importance of Metadata: A Forgone Conclusion? [read post]
6 Apr 2011, 5:08 am by Rob Robinson
eDiscovery Pricing Estimation Calculator - http://tinyurl.com/38vzqad (ComplexDiscovery) Evidence Exchange Achieves Relativity Best In Service Status - http://tinyurl.com/42djy5g (PRWeb) Fios' Revolving Door - http://tinyurl.com/3qktbnz (Monica Bay) FTI Announces That Schonbraun McCann Group and Brewer Businesses Adopt the FTI Consulting Brand - http://tinyurl.com/3hddvot (Business Wire) GGO/Digital WarRoom Software, Priced under $1000 Makes Professional, Affordable eDiscovery a… [read post]
29 Jan 2018, 5:00 am by Anonymous
Intermediaries can block based on a web URL (like www.example.com for an entire site or www.example.com/page for a single page)[6] or an IP address (like 216.3.128.12).[7] In some cases they can disrupt elements of the Domain Name System in order to prevent a URL from resolving to the correct IP address.[8] Location-based blocking can be over-inclusive (like by blocking all content on an IP address, when only some of it is unlawful) and under-inclusive (like by blocking one instance of an… [read post]
18 Jan 2024, 5:48 am by Bob Ambrogi
If I’m on a document, all the metadata I can store with regards to what matter, what attorney, who has access, all those types of things, are going to be embedded as well. [read post]
8 Feb 2022, 8:40 am by Catherine Reach
For more considerations on phones see Options for Law Office Phone Systems. [read post]
29 May 2015, 12:16 pm by Michael Payne
  This process strips the metadata that would be found in the original electronic version and violates the rules governing the production of ESI. [read post]
3 Feb 2011, 4:45 am by Rob Robinson
Don’t Assume You’re Getting Metadata With That - http://bit.ly/gyMABX (John Martin) Hon. [read post]
25 Jan 2024, 8:31 am by Ann Pearson
They might use an app and an iPad at trial compared to another firm that might have a more expensive system designed for their team’s specific needs. [read post]
28 May 2015, 11:04 am by Tara Hofbauer
According to Reuters, the plan will likely force Chinese government agencies to buy technological software from domestic purveyors. [read post]
10 Oct 2013, 10:55 am by Clara Spera
And we’ve decided to hold delivery of certain of the large-scale military systems. [read post]
14 Dec 2011, 3:45 am by Rob Robinson
KPMG’ Order Highlights Preservation Burdens - bit.ly/rZdOj8 (Christopher Boehning, Daniel Toal) Sanctions Ordered for Failure to Adequately “Preserve, Search and Collect Potentially Relevant Information” - bit.ly/t3yZay (K&L Gates) Secrets of Search – Part One | E-Discovery Team - bit.ly/vNeqoK (Ralph Losey) Should Freedom of Information Requests Extend to Technology and Software Systems? [read post]
27 Mar 2021, 6:58 am by Rob Robinson
Data Collection/Ingestion Phase in a Nutshell: Identify the input (dynamic) data to be collected and the corresponding context metadata. [read post]
17 Apr 2024, 9:01 am by Greg Lambert and Marlene Gebauer
And we will create metadata on the process and all of those clauses like per customer, we easily have a couple of million of clauses and definitions that we process. [read post]
8 Apr 2019, 3:05 pm by Rebecca Tushnet
Lenz may also prevent the use of automated systems. [read post]
7 Feb 2013, 5:00 am by Steve Schultze
The metadata isn’t as complete as what’s on PACER, and it’s hard to monitor for updates. [read post]
18 Jan 2022, 11:54 am by CodeX
In addition to improved risk analysis, other potential benefits include improved operations: a solution representing contract as code can be plugged into an API to then “feed” many other insurance systems (e.g., the claim manager, policy manager, and/or call center software) with the data source derived directly from the contracts. [read post]
7 Nov 2015, 5:47 am by Elina Saxena
Herb Lin wrote on large-scale geoengineering, “attempts to modify the planetary system in such a way as to mitigate the effects of global warming,”  and the potential threat that it poses to national security. [read post]