The emergence of ML and AI is already shaping society, political systems and our economies. The underlying assets driving such changes are largely informational. Access and licensing of data can thus be understood as one of the cornerstone of the development of ML and AI. This is true in an abstract sense, but when combined to the fact that there exists a widening data gap between multinational firms with platform-based business models on one hand, and governments, citizens and other businesses on the other, the need for clarity in data licensing becomes imperative.
An early, working list of eDiscovery-related industry events and conferences for 2020. The non-comprehensive planning list is based on research and tracking by ComplexDiscovery and is regularly updated as selected event and conference information is published.
A worldwide, non-profit organization, the Merlin Foundation strives to foster worldwide education about the benefits of open source software; provide a central platform for legal professionals to collaborate on open source development projects; and distribute open source software under free license to individuals and organizations around the world to improve access to justice and for legal and regulatory compliance.
Business Email Compromise/Email Account Compromise (BEC/EAC) is a sophisticated scam that targets both businesses and individuals who perform legitimate transfer-of-funds requests. The scam is frequently carried out when a subject compromises legitimate business or personal email accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds. Between June 2016, and July 2019, more than $26B in exposed dollar losses due to BEC/EAC were reported to the Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3).
Ransomware attacks are becoming more targeted, sophisticated, and costly, even as the overall frequency of attacks remains consistent. Since early 2018, the incidence of broad, indiscriminate ransomware campaigns has sharply declined, but the losses from ransomware attacks have increased significantly, according to complaints received by IC3 and FBI case information.
As highlighted by Alan Henry in his recent New York Times article, when people in the workplace have been treated unfairly and decide to speak up about it, they’re usually told to consider the intentions of the aggressor instead of the action, or to consider that maybe the issue isn’t as bad as they think, or not significant enough to warrant corrective action. Worse, they may be told that the event didn’t happen at all. Whether you think you’re being gaslit by a co-worker trying to get away with treating you poorly, or a boss who would rather not confront bad behavior, trust your experiences and your interpretations of those experiences.
This in-progress overview of three important business metric trajectories is provided as a precursor to the final results of the sixteenth quarterly eDiscovery Business Confidence Survey currently being conducted by ComplexDiscovery. These preliminary results highlight the responses of legal, business, and technology professionals across the eDiscovery ecosystem to three specific business questions regarding days sales outstanding (DSO), monthly recurring revenue (MRR) and customer revenue distribution metrics.
ACEDS leans forward into the future with the announcement and introduction of industry experts Mike Quartararo and Ari Kaplan as new executive team leaders.
“Helping clients find and take action on critical corporate information within hours – whether on laptops, desktops, corporate servers, in SaaS applications or in the cloud – is an incredibly powerful capability that the market is just now beginning to leverage,” said Craig Carpenter, CEO of X1. “X1 has an incredible opportunity in front of it, which was the catalyst for this round of growth capital. We’re ecstatic to gain the support of great partners like Palisades Growth Capital and George Kadifa for our journey to come.”
The Court of Justice of the European Union decides that the consent which a website user must give to the storage of and access to cookies on his or her equipment is not validly constituted by way of a prechecked checkbox which that user must deselect to refuse his or her consent.