Latest Posts

Time For Outsourcing? A Look At BPO That Might Inform LPO

The main opportunity to push for greater innovation and to draw on specialist capabilities obviously comes at contract time, and there is good news here. To keep up with rapidly changing technology requirements, corporate buyers have been trimming the sourcing cycle. The average contract length for IT and BPO deals shrunk from 4.8 years in 2007 to 4.3 years in 2017, according to IDC, and we expect it will settle at slightly more than 4 years.

A Security Cause to Pause: The Microarchitectural Data Sampling (MDS) Vulnerability

A new group of Intel vulnerabilities, collectively called Microarchitecture Data Sampling (MDS), were disclosed last week. The vulnerabilities allow attackers to steal data as processes run on most machines using Intel chips. The vulnerabilities affect nearly every Intel processor released in the past decade and may be especially dangerous in multi-user environments like virtualized servers in data centers.

NPS: You May Want to Know More About This Important Number

A Net Promoter Score®, commonly referred to as NPS®, is a straightforward metric that measures customer experience and appears to be a predictor of company growth. Based on the importance of customer experience for eDiscovery businesses and the increasing investor activity in the data and legal discovery ecosystem, it appears to be a number of increasing interest to both organizational leaders and industry investors.

Federal IT Investments and the Cloud in FY 2020

According to the IT Dashboard, federal agencies expect to invest a combined $1.6 billion in cloud infrastructure as a service (IaaS) and platform as a service (PaaS), $924 million in cloud software as a service (SaaS), and $9.9 billion in other managed services. The true figures are likely 15-20 percent higher, as $19 billion in national security-related IT projects are not reported to the dashboard.

BSA Releases Framework for Secure Software

The BSA Framework for Secure Software tackles complex security challenges through an adaptable and outcome-focused approach that is risk-based, cost-effective, and repeatable. The Framework describes baseline security outcomes across the software development process, the software lifecycle management process, and the security capabilities of the software itself.

A Practical and Looming Danger? SHA-1 Collision Attacks

The work that Thomas Peyrin and his colleague, Gaetan Leurent, have done goes far beyond just proving SHA-1 chosen-prefix collision attacks are theoretically possible. They show that such attacks are now cheap and in the budget of cybercrime and nation-state attackers.

A 2019 Legal Technology Salary Mashup

The 2019 Legal Technology Salary Mashup shares an aggregation of general salary data points from publicly available research, reports, and industry observations that may be beneficial for use by legal technology leaders as they source and staff talent to support their data discovery and legal discovery business objectives.

TAR vs. Keyword Search Challenge, Round 6 (Instant Feedback)

Even with a large pool of participants, ample time, and the ability to hone search queries based on instant feedback, nobody was able to generate a better production than Technology-Assisted Review (TAR) when the same amount of review effort was expended. It seems fair to say that keyword search often requires twice as much document review to achieve a production that is as good as what you would get TAR.

Machine Translation: The Importance of Document-Level Evaluation

Research suggests that when it comes to evaluating entire documents, human translations are rated as more adequate and more fluent than machine translations. Human raters assessing adequacy and fluency show a stronger preference for human over machine translation when evaluating documents as compared to isolated sentences. This suggests that the way machine translation is evaluated needs to evolve away from a system where machines consider each sentence in isolation.