Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Perspectives on Blockchain and the Music Industry Image

Perspectives on Blockchain and the Music Industry

Stan Soocher

A Q&A with Entertainment Lawyer Leslie Zigel

Features

Competitive Intelligence: What Is Your Dashboard Report Telling You? Chances Are, Not Much. Image

Competitive Intelligence: What Is Your Dashboard Report Telling You? Chances Are, Not Much.

Jim Jarrell

Until recently, most law firms operated with a cadre of legacy operating systems, financial platforms and reporting technologies from different manufacturers that have no mechanism for connecting with each other, let alone automatically extracting and updating data points between systems. The disparate nature of these technologies has exacerbated the struggle to leverage data and display results in a reporting mechanism that helps direct the firm's decision-making.

Features

Marketing Tech: Five Quick and Easy Ways to Hack Your Business Development Image

Marketing Tech: Five Quick and Easy Ways to Hack Your Business Development

Ari Kaplan

The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.

Features

Takeaways from the Recent Qualcomm Decision Image

Takeaways from the Recent Qualcomm Decision

Karen Hoffman Lent & Kenneth Schwartz

The DOJ's intervention, and the judge's ultimate decision, has exposed tensions between the DOJ and FTC, and within the FTC itself, and public scrutiny is far from over as the case heads to the Ninth Circuit on appeal.

Features

5 Quick and Easy Ways to Hack Your Business Development Image

5 Quick and Easy Ways to Hack Your Business Development

Ari Kaplan

The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.

Features

Clients Drive Information Governance: Business Benefits Flow to Firm Image

Clients Drive Information Governance: Business Benefits Flow to Firm

Stephen Cole

Information governance and the protection of corporate data are top concerns for law firms. To ensure standards are met, some clients are now tying payment to compliance with Outside Counsel Guidelines (OCG).

Features

Legal Tech: How E-Discovery Trends Are Reshaping E-Discovery Teams Image

Legal Tech: How E-Discovery Trends Are Reshaping E-Discovery Teams

Nishad Shevde

E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?

Features

Fourth Quarter Educational Events to Stay on Track Image

Fourth Quarter Educational Events to Stay on Track

Nina Cunningham

A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.

Features

The International Encryption Debate: Privacy Versus Big Brother Image

The International Encryption Debate: Privacy Versus Big Brother

Robert J. Anello & Richard F. Albert

Although increased reliance on technology such as emails and texts has provided greater opportunity to gather evidence of criminal activity, law enforcement agencies around the world complain that encryption technologies make it difficult to catch criminals and terrorists and therefore should be restricted.

Features

When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data Image

When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data

Michael Ciaramitaro & Sarah Brown

Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES