Growing data volumes, cloud service options, and overwhelming number of mobile devices continue to add to the complexity of eDiscovery. Information dispersed across various data sources (endpoints and popular cloud applications) and outdated technology for eDiscovery make the collection and preservation of ESI not only a tedious and manual process but can also be the source of data spoliation.
The slides from this webcast show modern eDiscovery technologies enables organizations to accelerate the eDiscovery process while reducing costs and risk by:
* Automating legal hold, in place preservation, collection and processing utilizing a single platform from Exterro
* Collection and preservation of end-user (including existing employee) data across endpoints and popular cloud applications (through Druva)
* Streamlining data transfer and ingestion to eliminate technology bottlenecks for faster analysis and review
See the webcast at: http://bit.ly/2fBeLXW
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
Security and privacy of cloud data: what you need to know (Interop)Druva
Is your company thinking about the cloud or already in there but learning fast about the many challenges of the security and privacy of cloud data?
Learn more about the landscape of data in the cloud, and the obstacles that every company should consider when it comes to protecting their down.
Presentation of our survey of 625 IT decision-makers across Europe in mid to large enterprises. Questions include:
Is enterprise cloud adoption becoming a reality in 2015?
Which cloud adoption model will prevail; public, private or hybrid?
What percentage of workloads would move to the cloud and which percentage will remain in the data centre?
What will the role of corporate data centres be in the cloud era?
Will data centre outsourcing become more common?
How will on-premise and cloud-based IT infrastructure be connected?
What will cloud 2020 look like?
Moving from data to insights: How to effectively drive business decisions & g...Cloudera, Inc.
Firms have become obsessed with data. But the key to competitive advantage is not just more or bigger data or big data technology, it is finding actionable insights from all the data as well as embedding insight in processes and applications. This requires a change in your approach - modernized architecture and embedding insights and data in you business decisions It also requires a change in how your people work systematically to find, test and implement insights. In this webinar, Forrester Vice President and Principal Analyst Brian Hopkins will present results from two years of research into these ideas and recommend to attendees how they can get the most out of their data and analytics to drive effective business decisions and gain competitive advantage.
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
Security and privacy of cloud data: what you need to know (Interop)Druva
Is your company thinking about the cloud or already in there but learning fast about the many challenges of the security and privacy of cloud data?
Learn more about the landscape of data in the cloud, and the obstacles that every company should consider when it comes to protecting their down.
Presentation of our survey of 625 IT decision-makers across Europe in mid to large enterprises. Questions include:
Is enterprise cloud adoption becoming a reality in 2015?
Which cloud adoption model will prevail; public, private or hybrid?
What percentage of workloads would move to the cloud and which percentage will remain in the data centre?
What will the role of corporate data centres be in the cloud era?
Will data centre outsourcing become more common?
How will on-premise and cloud-based IT infrastructure be connected?
What will cloud 2020 look like?
Moving from data to insights: How to effectively drive business decisions & g...Cloudera, Inc.
Firms have become obsessed with data. But the key to competitive advantage is not just more or bigger data or big data technology, it is finding actionable insights from all the data as well as embedding insight in processes and applications. This requires a change in your approach - modernized architecture and embedding insights and data in you business decisions It also requires a change in how your people work systematically to find, test and implement insights. In this webinar, Forrester Vice President and Principal Analyst Brian Hopkins will present results from two years of research into these ideas and recommend to attendees how they can get the most out of their data and analytics to drive effective business decisions and gain competitive advantage.
Digital Government: Data + Government Isn't Enough | Wrangle Conference 2017Cloudera, Inc.
Government agencies are collecting and producing data at an accelerating rate, and constituents want access to this data with decreasing latency. Meeting a digitally savvy polity's desire for data while ensuring that data is open, accessible, and interpretable by all comes with unique challenges. I'll share some of these while walking through how governments are building their own data products using open data as well as empowering civic hackers. I'll also walk through why data science at the government level is fundamentally different than data science in the private sector.
DATAOPS: THE NEXT BIG WAVE ON YOUR DATA JOURNEY - Big Data Expowebwinkelvakdag
Hitachi Vantara believes DataOps is the next big wave to hit the IT sector because it can unleash the FULL power and potential of your employees and/or customers and your data.
Imagine the number of potential transformations that didn’t come to fruition because 97.5% of your data never made it into the hands of your team. With DataOps these scenarios will be a thing of the past, because your employees and/or customers will be empowered with the right data at the right time.
This session is about DataOps, delivering the right data, to the right place at right time to the right person. DataOps achieves the promise of analytics, machine learning, and AI to transform operations and drive innovation.
The presentation will go into what DataOps is and how we as Hitachi Vantara solve the DataOps challenges.
The demonstration is targeted to the cooperation between data engineers, data scientists and business analysts to remove bottlenecks in training, tuning, testing and deploying predictive models at one side and monitoring, evaluating, comparing and rebuilding these models. Model accuracy degrades over time; monitoring and switching models is cumbersome. Hitachi Pentaho can help here.
How Cloudera SDX can aid GDPR compliance 6.21.18Cloudera, Inc.
In this webinar, we will cover:
Technical capabilities required in your data platform including metadata classification on ingest, column-level lineage, fine-grained authorization, encryption, and more
How a shared data experience can facilitate the safe handling of metadata
Ways to enable your data platform for GDPR success
The Vortex of Change - Digital Transformation (Presented by Intel)Cloudera, Inc.
The vortex of change continues all around us – inside the company, with our customers and partners. A new norm is upon us. Business models are being turned upside down – the hunters now the hunted, global equalization – size is no longer a guarantee of success. The innovative survive and thrive…the nervous and slow go under...what does all this change means for you? Find out how does Intel’s strengths help our customers in this world of change.
Webinar - Case Study: ProtectWise enhances network security with DataStax alw...DataStax
DataStax customer, ProtectWise, a leading enterprise security provider, is revolutionizing how network security is managed by using innovative technologies such as machine learning, gaming, and virtual reality powered by an always-on data platform from DataStax to effectively detect fraud and combat network attacks. Hear from ProtectWise Co-Founder & CTO, Gene Stevens, and learn how ProtectWise uses next-gen technologies, including the advanced data management solution from DataStax, to protect customer data.
View recording: https://youtu.be/E1I8sje9GfE
Explore all DataStax webinars: http://www.datastax.com/resources/webinars
The quest for the insight-driven enterprise has spurned a mass exodus to the cloud. But cloud data ecosystems can be very complex with multiple data storage and processing options.
These slides-based on the webinar featuring leading IT analyst firm EMA, Amazon Web Services (AWS), and Trifacta--will help you: understand technology trends that simplify your analytics modernization journey; learn best practices to operationalize data management on AWS; establish operational excellence leveraging AWS data storage and processing; accelerate time-to-value for analytics projects with data preparation on AWS.
Keynote from Big Data World Show Singapore, April 2015.
• How is data driving change?
• Where are the opportunities, across industries?
• What is required to gain value from data?
• How can you get started today?
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
Using Big Data to Transform Your Customer’s Experience - Part 1 Cloudera, Inc.
3 Things to Learn About:
-How the Customer Insights Solution helped
- How customer insights can improve customer loyalty, reduce customer churn, and increase upsell opportunities
- Which real-world use cases are ideal for using big data analytics on customer data
This session describes the roles and skill sets required when building a Data Science team, and starting a data science initiative, including how to develop Data Science capabilities, select suitable organizational models for Data Science teams, and understand the role of executive engagement for enhancing analytical maturity at an organization.
Objective 1: Understand the knowledge and skills needed for a Data Science team and how to acquire them.
After this session you will be able to:
Objective 2: Learn about the different organizational models for forming a Data Science team and how to choose the best for your organization.
Objective 3: Understand the importance of Executive support for Data Science initiatives and role it plays in their successful deployment.
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
More than any business, telecommunications firms have long been dealing with huge, diverse sets of data. Big Data. Data that is unstructured, unwieldy and disorganised, making it difficult to analyse and costly to manage. Your landscape is fiercely competitive and you instinctively know it's exactly that data that would allow you to be more innovative. Data that would set you apart from the competition. You would like to realise its true potential yet you have concerns around security, RoI or integration with existing data management solutions.
ANDRITZ, a global manufacturing company formed by acquisitions, with over 50 offices and a virtual IT department, decided that a cloud-first strategy for server backups was the only solution for a disparate and dispersed environment. Brian Bagwell, IT Director of North America and Trey Brown, IT Manager, discussed the company’s challenges to gain more visibility of their data and a cloud-based disaster recovery solution.
With Druva, they discuss:
* Managing complexities of multi-site server recovery requirements being maintained by a virtual IT staff
* Best practices for server backup and data retention with centralized control
* Immediate benefits realized by ANDRITZ such as server restores in seconds, data privacy, and cost savings
To hear the recording, please visit: http://pages2.druva.com/Rethink-Server-Backup-and-Regain-Control-On-Demand.html?utm_source=Social&utm_medium=slideshare
Digital Government: Data + Government Isn't Enough | Wrangle Conference 2017Cloudera, Inc.
Government agencies are collecting and producing data at an accelerating rate, and constituents want access to this data with decreasing latency. Meeting a digitally savvy polity's desire for data while ensuring that data is open, accessible, and interpretable by all comes with unique challenges. I'll share some of these while walking through how governments are building their own data products using open data as well as empowering civic hackers. I'll also walk through why data science at the government level is fundamentally different than data science in the private sector.
DATAOPS: THE NEXT BIG WAVE ON YOUR DATA JOURNEY - Big Data Expowebwinkelvakdag
Hitachi Vantara believes DataOps is the next big wave to hit the IT sector because it can unleash the FULL power and potential of your employees and/or customers and your data.
Imagine the number of potential transformations that didn’t come to fruition because 97.5% of your data never made it into the hands of your team. With DataOps these scenarios will be a thing of the past, because your employees and/or customers will be empowered with the right data at the right time.
This session is about DataOps, delivering the right data, to the right place at right time to the right person. DataOps achieves the promise of analytics, machine learning, and AI to transform operations and drive innovation.
The presentation will go into what DataOps is and how we as Hitachi Vantara solve the DataOps challenges.
The demonstration is targeted to the cooperation between data engineers, data scientists and business analysts to remove bottlenecks in training, tuning, testing and deploying predictive models at one side and monitoring, evaluating, comparing and rebuilding these models. Model accuracy degrades over time; monitoring and switching models is cumbersome. Hitachi Pentaho can help here.
How Cloudera SDX can aid GDPR compliance 6.21.18Cloudera, Inc.
In this webinar, we will cover:
Technical capabilities required in your data platform including metadata classification on ingest, column-level lineage, fine-grained authorization, encryption, and more
How a shared data experience can facilitate the safe handling of metadata
Ways to enable your data platform for GDPR success
The Vortex of Change - Digital Transformation (Presented by Intel)Cloudera, Inc.
The vortex of change continues all around us – inside the company, with our customers and partners. A new norm is upon us. Business models are being turned upside down – the hunters now the hunted, global equalization – size is no longer a guarantee of success. The innovative survive and thrive…the nervous and slow go under...what does all this change means for you? Find out how does Intel’s strengths help our customers in this world of change.
Webinar - Case Study: ProtectWise enhances network security with DataStax alw...DataStax
DataStax customer, ProtectWise, a leading enterprise security provider, is revolutionizing how network security is managed by using innovative technologies such as machine learning, gaming, and virtual reality powered by an always-on data platform from DataStax to effectively detect fraud and combat network attacks. Hear from ProtectWise Co-Founder & CTO, Gene Stevens, and learn how ProtectWise uses next-gen technologies, including the advanced data management solution from DataStax, to protect customer data.
View recording: https://youtu.be/E1I8sje9GfE
Explore all DataStax webinars: http://www.datastax.com/resources/webinars
The quest for the insight-driven enterprise has spurned a mass exodus to the cloud. But cloud data ecosystems can be very complex with multiple data storage and processing options.
These slides-based on the webinar featuring leading IT analyst firm EMA, Amazon Web Services (AWS), and Trifacta--will help you: understand technology trends that simplify your analytics modernization journey; learn best practices to operationalize data management on AWS; establish operational excellence leveraging AWS data storage and processing; accelerate time-to-value for analytics projects with data preparation on AWS.
Keynote from Big Data World Show Singapore, April 2015.
• How is data driving change?
• Where are the opportunities, across industries?
• What is required to gain value from data?
• How can you get started today?
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
Using Big Data to Transform Your Customer’s Experience - Part 1 Cloudera, Inc.
3 Things to Learn About:
-How the Customer Insights Solution helped
- How customer insights can improve customer loyalty, reduce customer churn, and increase upsell opportunities
- Which real-world use cases are ideal for using big data analytics on customer data
This session describes the roles and skill sets required when building a Data Science team, and starting a data science initiative, including how to develop Data Science capabilities, select suitable organizational models for Data Science teams, and understand the role of executive engagement for enhancing analytical maturity at an organization.
Objective 1: Understand the knowledge and skills needed for a Data Science team and how to acquire them.
After this session you will be able to:
Objective 2: Learn about the different organizational models for forming a Data Science team and how to choose the best for your organization.
Objective 3: Understand the importance of Executive support for Data Science initiatives and role it plays in their successful deployment.
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
More than any business, telecommunications firms have long been dealing with huge, diverse sets of data. Big Data. Data that is unstructured, unwieldy and disorganised, making it difficult to analyse and costly to manage. Your landscape is fiercely competitive and you instinctively know it's exactly that data that would allow you to be more innovative. Data that would set you apart from the competition. You would like to realise its true potential yet you have concerns around security, RoI or integration with existing data management solutions.
ANDRITZ, a global manufacturing company formed by acquisitions, with over 50 offices and a virtual IT department, decided that a cloud-first strategy for server backups was the only solution for a disparate and dispersed environment. Brian Bagwell, IT Director of North America and Trey Brown, IT Manager, discussed the company’s challenges to gain more visibility of their data and a cloud-based disaster recovery solution.
With Druva, they discuss:
* Managing complexities of multi-site server recovery requirements being maintained by a virtual IT staff
* Best practices for server backup and data retention with centralized control
* Immediate benefits realized by ANDRITZ such as server restores in seconds, data privacy, and cost savings
To hear the recording, please visit: http://pages2.druva.com/Rethink-Server-Backup-and-Regain-Control-On-Demand.html?utm_source=Social&utm_medium=slideshare
Indian Barcode Corporation is manufacturer and supplier of Barcode Labels & Ribbons, Biggest distributor of Barcode Label Printers & Scanners from Toshiba, Godex, Argox, TVS , TSC, Brother, Zebra, Sato, Epson, Citizen and their Service Center.
We are Manufacturer and Supplier of White Polypropylene Label Product, White Polypropylene label manufacturer, dealer & distributor, 3M White labels, Matte White Polypropylene label, Removable White Polypropylene label, Polypropylene label supplier, Price for Polypropylene label, 3M White matte white labels, dealer & distributor.
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
AWS re:Invent 2014 session: A technical deep dive on how inSync utilizes AWS architecture: S3, Glacier, and Dynamo DB. Full event recap here: http://bit.ly/1yTWOFM
Learn how AWS customers save money, time, and effort by using AWS's backup and archive services. Organizations of all sizes rely on AWS's services to durably safeguard their data off-premises at a surprisingly low cost. This session will illustrate backup and archive architectures that AWS customers are benefitting from today.
Sussex based Pharmaceutical company, Teva UK Ltd, has up to 6 vacancies for trainee analysts to join them after graduation. This presentation details information about the industry.
Webinar with Anaplan and IDC: The benefits of connected planningAnaplan
Anaplan hosted a webinar with IDC analyst Mickey North Rizza around the key pillars of a modern enterprise-wide planning process and the benefits of connected planning.
Natalicio de Benito Juarez Biografia para Niños
Natalicio de Benito Juarez, Politico mexicano nacido en San Pablo Guelatao, Oaxaca, el 21 de Marzo de 1806. Fue hijo de indígenas de raza pura y no hablaba español. Marcelino Juárez y Brigada García eran sus padres.
Ellos murieron cuando Benito tenia 3 años de edad, entonces el niño fue criado por sus abuelos, con Juárez vestido de pastorcillo trabajo como pastor hasta los 12 años.
A esa edad de traslado a la ciudad de Oaxaca, donde trabajo y estudio al mismo tiempo. Fue protegido por el sacerdote Francisco Antonio Salanueva, quien le enseño español y lo encamino en su estudio.
Juárez se graduó como abogado en 1834 en el Instituto de Ciencias y Artes de Oaxaca, en donde fue profesor y rector. Empezó a trabajar defendiendo a los indígenas que sufrían abusos de los curas y autoridades.
Benito Juarez el Principio de su Política
En 1847 fue elegido como diputado federal y se traslado a la Ciudad de México donde finalizo sus relaciones con los liberales, en el mismo año fue nombrado gobernador de Oaxaca, cargo que aprovechó para ordenar las finanzas públicas, construir muchas escuelas de primaria y ampliar los caminos. En su oficina atendía personalmente a los ciudadanos de toda condición económica y social.
Durante su carrera política se desempeño como diputado en el Congreso de Unión y como gobernador de su estado natal. Durante la Guerra de Reforma el presidente Juárez incorporo varias leyes a la constitución de 1857 que son de la mayor importancia para la vida del país y que sirvieron para resolver muchos problemas así como apoyar el desarrollo del país.
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.
In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
Most organizations are focused on building protection around their enterprise networks, devices and applications. But what if an employee downloads sensitive product roadmap details, or customer data, before resigning from the company?
Seclore’s data-centric security solution helps your customers address the growing risks of data breaches and leaks, by protecting the data itself. No matter where or how information travels or is stored, it remains protected. And Seclore also solves key regulatory compliance issues many customers are facing with GDPR, PCI-DSS, and NIST
Microsoft Teams in the Modern WorkplaceJoanne Klein
Joanne Klein delves into Microsoft Teams to give a glimpse of its features, its underlying architecture, and what’s in it for the modern worker and the data protection, data retention, and legal/compliance teams across your organization.
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
The Briefing Room with Mark Madsen and Cisco
Live Webcast August 18, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=0eff120f8b2879b582b77f4ff207ee54
Today's digital enterprises are seeing an explosion of data at the edge. The Internet of Everything is fast approaching a critical mass that will demand a sea change in how companies process data. This new world of information is widely distributed, streaming, and overall becoming too big to move. Experts predict that within two to three years, the bulk of analytic processing will take place on the fringes of information architectures. As a result, forward-thinking companies are dramatically shifting their analytic strategies.
Register for this episode of The Briefing Room to hear veteran Analyst Mark Madsen of Third Nature explain how a new era of information architectures is now unfolding, paving the way to much more responsive and agile business models. He'll be briefed by Kim Macpherson of the Cisco Data and Analytics Business Unit, who will explain how her company's platform is uniquely suited for this new, federated analytic paradigm. She'll demonstrate how edge analytics can help companies address opportunities quickly and effectively.
Visit InsideAnalysis.com for more information.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Netskope
Let’s face it: When it comes to data loss prevention, we’re not in Kansas anymore. Any and all types of sensitive business data is now stored in the cloud and accessed from personal devices and most of the time, IT doesn’t even know it. This presentation is from a webinar with our guest speaker Forrester VP and Principal Analyst John Kindervag and Netskope VP of Product Management Rajneesh Chopra. In it, they explore the following:
- Trends surrounding cloud and data loss prevention
- How on-premises DLP users have helped shape the design of new, cloud-based solutions
- Key architectural considerations for enterprises who have invested in on-premises DLP
- Pitfalls that every IT security professional should look out for when developing a cloud DLP strategy
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Aggregage
The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.
CSC - Presentation at Hortonworks Booth - Strata 2014Hortonworks
Come hear about how companies are kick-starting their big data projects without having to find good people, hire them, and get IT to prioritize it to get your project off the ground. Remove risk from your project, ensure scalability , and pay for just the nodes you use in a monthly utility pricing model. Worried about Data Governance, Security, want it in the cloud, can’t have it in the cloud….eliminate the hurdles with a fully managed service backed by CSC. Get your modern data architecture up and running in as little as 30 days with the Big Data Platform As A Service offering from CSC. Computer Science Corporation is a Certified Technology Partner of Hortonworks and is a Global System Integrator with over 80,000 employees globally.
Webinar: Preserve, Distribute and Deliver - M&E's Three Biggest Data ChallengesStorage Switzerland
In this webinar Storage Switzerland and Caringo, providers of cloud and object storage, will discuss why preservation, distribution and delivery is so critical for M&E IT and also why it is so challenging to deliver. More importantly, we will discuss practical solutions to these challenges so IT departments can lead their organizations to more monetization opportunities.
You Can’t Live Without Open Source - Results from the Open Source 360 SurveyBlack Duck by Synopsys
Today, open source drives technology and development, and its worldwide adoption ranges from companies with a single employee to large corporations like Microsoft and Apple. All of these organizations rely on open source to innovate, reduce development costs, and speed time to market. Recent research reports point out that open source comprises 80% to 90% of the code in a typical application. Our Open Source 360° survey provides an update on the rapid evolution of open source development, use and management.
The 2017 Open Source 360° survey was conducted through Black Duck’s Center for Open Source Research & Innovation (COSRI), focusing on four important areas of open source – usage, risk, contributions and governance/policies. Our respondents include input from new players, established leaders, and influencers across vertical markets and communities. This range of respondents drives broad industry awareness and discussions of these key issues.
Similar to 4 ways to cut your e discovery costs in half-webinar-exterro-druva (20)
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
According to CNN, ransomware incidents are expected to cost enterprises $1B in 2016 and no organization is immune. Healthcare, law enforcement and others have been attacked with malware, restricting access to systems and data until a ransom is paid. With ransomware attacks on the rise, organizations have found themselves vulnerable and struggling to reduce risk or proactively prepare for an attack response.
John Shier, Sr. Security Officer at Sophos and Sey Verma, Product Marketing Manager at Druva provide insights into how to confidently prepare your organization to combat ransomware threat including:
* Proactive strategies to protect data before a malicious attack occurs
* Factors and issues that can complicate your organization’s risks
* Measures to gain immediate access to data during and after an attack.
As attacks become more sophisticated, IT organizations need to become ever-vigilant and proactive in mitigating ransomware and other malware attacks.
You can access the live recording at: http://pages2.druva.com/Proactive-Approach-to-Combat-Ransomware-Webinar-On-Demand.html
Where in the world is your PII and other sensitive data? by @druva incDruva
Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Full blog here: http://bit.ly/1Jtzym5
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
We asked Black Hat 2015 attendees about six common data risk scenarios. The findings show that the majority are struggling to protect sensitive corporate data across laptops, phones and in the cloud.
Take a look at these findings. How does your business handle these common and increasingly critical data protection scenarios? http://bit.ly/1TP8RmD
Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Full blog here: http://bit.ly/1Jtzym5
The state of data privacy with dimensional research Druva
Here are the slides from the Data Privacy webinar we hosted with Dimensional Research. Full access to the full data privacy report that's referenced in the slides, go here: http://bit.ly/1EoYo3r
How prepared are you when it comes to Data Privacy? Take the enterprise data privacy quiz to find out. Follow along and mark your answers to see how you stack against your peers or read the report here: http://bit.ly/1DUGMfH.
Is your company prepared over the security and privacy of its data? Check out the 4 recommended aspects that we think deserve a bit more thought. http://bit.ly/1EqKe5P
What are some items every CIO should review when making the decision on whether or not to cloud? This infographic covers the most important aspects. More here: http://bit.ly/1vpGeKL
In a world of evolving threats, your mobile data is in constant danger. All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices—usually a laptop, a tablet, and a smartphone—that they use both inside and outside of the office. Plus often they’re using their own personal devices to access corporate data. And outside the corporate firewall, it’s a wild world. Learn more at wild.druva.com.
Here are 40 scary stats about endpoint data at risk that we've compiled -- and turning a blind eye won't make them go away. Go to wild.druva.com to learn more!
The Challenges of Windows XP Migration (infographic)Druva
n April 2014, support for Windows XP ends. If you still have computers to migrate, you have a lot of work on your hands: it takes 4-6 hours to migrate a single device from Windows XP, and most employees have more than 2 devices. With a traditional migration tool, there’s a 50% chance you’ll put in evening and weekend hours to migrate. It’s time to get your head out of the sand and begin planning your migration. Learn about the easier way to migrate: www.druva.com/migrate-your-os
The volume of corporate data is exploding. Worldwide corporate data now doubles every 14 months and will reach 10.5 ZB by 2020. How and why is corporate data increasing so rapidly?
Series C: The growth, innovation, and leadership of DruvaDruva
On October 15th, 2013, we secured $25M in Series C funding led by Tenaya Capital with Sequoia Capital and Nexus Venture Partners. From 7 employees and our first customer in 2008, to 200 employees and over 1200 customers now, see how far we've come.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
20. WEBCAST HOSTED BY
+
Thanks for Attending
For more information on anything from today’s presentation, please contact…
Seyi Verma SEYI.VERMA@DRUVA.COM
Joe Mulenex JOE.MULENEX@EXTERRO.COM
Mike Hamilton MICHAEL.HAMILTON@EXTERRO.COM
Editor's Notes
Hello everyone...My name is Mike Hamilton, I welcome you to today’s webcast, “4 Ways to Cut Your E-Discovery Costs in Half.”
We’ll get started with the webcast in just a moment. First, a few brief reminders:
All the lines have been muted to reduce background noise. We do encourage you to submit questions at any time through your webinar control panel. We will do our best to work those in throughout the discussion.
This webcast is being recorded and will be posted, along with a copy of the slides and additional resources, to Exterro’s website. We will also be sending you a link to those materials later today over email.
We have a couple poll questions incorporated into the discussion today. Answers to those are very insightful for our presenters and help to drive a more meaningful conversation for you so we appreciate your participation.
We also ask that you please stick around after the webcast is over and complete a very short survey. It will pop up on your screen automatically once we close out of the webcast and should only take a minute or so to complete.
Speaker: Mike
Duration: 30 seconds
Recognized as an e-discovery software market “leader” for the third year in row by Gartner in the 2015 Magic Quadrant for E-Discovery Software, Exterro helps Global 2000 organizations manage the e-discovery process smarter. From the earliest stage of a matter, Exterro deliver insight into the critical information that drives winning strategies. Through intuitive project dashboards and flexible workflows, in-house teams enforce control and accountability.
Our second webcast sponsor is Druva. Druva is the leader in cloud data protection and information management, leveraging the public cloud to offer a single pane of glass to protect, preserve and discover information - dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva’s award-winning solutions intelligently collect data, and unify backup, disaster recovery, archival and governance capabilities onto a single, optimized data set. As the industry's fastest growing data protection provider, Druva is trusted by over 4,000 global organizations and protects over 25 PB of data.
Speaker: Mike
Duration: 2-3 min
Mike’s Speaker Notes:
Now let’s get to the know our webcast panel. I am really looking forward to today’s discussion. Today’s webcast panel is filled with two e-discovery thought leaders who have extensive experience helping legal professionals find ways to streamline their processes and reduce legal spend..
Our first webcast panelist is Joe Mulenex who is the director of solution engineering at ELM Solutions. Joe’s primary focus is to help clients understand how the technology can provide best in class solutions to the pain points they experience in their everyday workflows. Additionally, the Subject Matter Experts on his team work directly with clients to gather insight that will continue to move our applications forward and improve the client experience. Joe has over 8 years in the e-Discovery and Litigation Support world both on the Software side and the Vendor side.
Our second webcast panelist is Seyi Verma, Sr. Product Marketing Manager at Druva. Seyi Verma is a Sr. Product Marketing Manager at Druva. He has over 16 years of experience in product management and marketing, driving initiatives around product launches and positioning for both hardware and software. At Druva he leads product marketing for inSync, the company’s flagship product for protecting and governing data on endpoint devices. He has deep expertise with the challenges enterprises face managing the rising amount of data on endpoint devices and outside of the reach of IT.
And again my name is Mike Hamilton and I will be today’s moderator.
I’d like to thank the panel and all of you in the audience for attending today’s webcast. Please submit any questions you may have during the presentation. I will try my best to work them in during the webcast, time permitting.
Both Exterro and ELM Solutions will be live tweeting throughout the webcast. Please follow along by searching #legalanalytics to see the key takeaways along with additional resources to reference during the webcast.
One more housekeeping item: The commentary and positions discussed by our panelists today are just that, their commentary and positions and do not necessarily reflect the positions and thoughts of the organizations they represent.
Ok, we’ve met our webcast panel, let’s dive right into today’s webcast.
Speaker: Mike
Duration: 30 seconds
Time for topic #1: 10-15 minutes
Before we get into the crux of our presentation, we wanted to give all of you an overview of why it’s become so important to be constantly reassessing your e-discovery process. New obstacles like the growing data volumes, cloud service options, and overwhelming number of mobile devices used by employers make an already complex process, even more complicated and ultimately inefficient for some.
In this section, we will address 3 primary reasons why the e-discovery process is becoming more inefficient in today’s complex legal environment.
Speaker: Seyi, Joe
Duration: 3-4 minutes
The first reason why the e-discovery process is becoming more inefficient is based on the growing data volumes and new data types present in e-discovery. Yes we are talking about big data and big data has tremendous effects on e-discovery - adding to the complexity of it.
As you will read on the screen, the amount of data being produced, where it’s touching and how it’s being used is changing.
Seyi – Some of these stats are pretty staggering, especially when you think about how legal teams are responsible for searching through all this data. How have you seen this trend add inefficiency to e-discovery?
Joe – What are your thoughts?
Speaker: Joe, Seyi
Duration: 3-4 minutes
The second reason why the e-discovery process is becoming more inefficient is manual processes. This piggybacks on reason #1, legal teams are having to preserve, search, collect, process and review more data, making manual processes highly ineffective.
Joe – Let’s focus on the preservation and collection of data. What challenges does a manual process present legal teams when it comes to collecting and processing data?
Seyi – Data is also stored in many different locations. Preserving and collecting that can be tedious if they are connected, correct?
Speaker: Seyi, Joe
Duration: 3-4 minutes
The 3rd and final reason why the e-discovery process is becoming more inefficient is based on the use of old e-discovery software.
Seyi – What are common characteristics of what we considered old or traditional e-discovery software? How does the use of this software make e-discovery inefficient?
Joe – Some organizations are afraid of change and switching software. What are some reasons behind this and what problems can this mentality cause?
Speaker: Mike
Duration: 1 minute
Now that we have outlined reasons why the e-discovery process has become more efficient. Let’s talk about solutions. Legal teams should leverage technology throughout the department to help clear up these inefficiencies.
Legal must begin to realize that they can leverage existing IT solutions to help streamline e-discovery. Existing IT solutions meaning leverage their e-discovery software in combination with their compliance/archiving software to speed up the process, cut costs and become more efficient in e-discovery.
Speaker: Mike
Duration: 30 seconds
We’ve proposed a solution, let’s talk about how this inter-relation between compliance and e-discovery technology can help cut your e-discovery costs in half.
This is where we will spend the meat of this presentation, outlining 4 ways to cut your e-discovery costs in half with technology.
Speaker: Seyi, Joe
Duration: 7-8 minutes
The first ways to cut your e-discovery costs in half with technology is by having data-at-the ready for preservation/collection. No matter what your organization’s information governance policies are, keep everything, strict document retention policies, organizations will eventually at sometime need to access and produce data for e-discovery which will disrupt your IG policies.
Seyi – What does data at the ready mean and how can having data-at-the-ready help streamline preservation/collection activities?
Joe – Seyi did a good job identifying the solution but how do you get there? What tips do you have to start managing your data more effectively?
Seyi – Anything to add?
Poll Question: Do you feel like your information governance program enables you to have data ready for preservation/collection purposes?
Yes
No
Don’t know
Speaker: Seyi
Duration: 2 minutes
Seyi – Let’s give our audience an example of how this would work in practice. Exterro, an e-discovery software provider, has partnered with Druva, an archiving solution, to create a proactive, have data at the ready system. Care to explain.
Speaker: Joe, Seyi
Duration: 7-8 minutes
The second way to cut your e-discovery costs in half with technology is by automating your legal hold/preservation workflows. Legal teams have and probably always wills struggle with preservation based on that there is no bright line indicator when preservation must begin. Making it more imperative than ever to create a defensible preservation process the encompasses
Ease of applying holds across custodians and data sources
Ability to preserve ESI in a forensically sound manner and
Ability to authenticate ESI collected from the relevant data sources
Joe – For organizations with numerous ongoing matters and hundreds of custodians on hold, managing this process sound complicated and time consuming. How can organizations streamline these preservation activities and stop manually tracking these activities?
Seyi – If people followed the first way to cut e-discovery costs by having data at the ready for preservation, then it should enable legal teams to streamline this preservation process, correct?
Joe – For those instances when a legal hold isn’t enough and organizations want to preserve by collection, having a streamlined way to collect that data would help ensure defensibility while saving time and money, right?
Poll Question: How would you currently describe your preservation process?
Manual
Automated
Not sure
Speaker: Seyi, Joe
Duration: 7-8 minutes
Seyi – The third way to cut your e-discovery costs is by analyzing data immediately. What are the benefits of analyzing data earlier in the process?
Joe – the solution we have on the slide is two parts, connecting archiving and e-discovery collection solutions, which enable you to conduct an early data assessment. For now let’s focus on the latter, early data assessment. What is EDA and what is the benefit of connecting your data archive with an EDA solution (don’t have to re-collect, its instaneous, etc.)?
Poll Question: Do you currently use EDA at your organization?
Yes
No
Don’t know
Speaker: Seyi
Duration: 2 minutes
Seyi -- In practice, how does Druva and Exterro work together to ensure data can be analyzed immediately for EDA purposes?
Speaker: Joe, Seyi
Duration: 7-8 minutes
Lets move onto our last way to cut e-discovery costs and this by making successful proportionality claims, which leverages that immediate data analysis we talked about in the prior slides. The only way to make an effective, persuasive proportionality claim is to have metrics or data to support your claim. This data usually will have to showcase why proposed e-discovery parameters are unduly burdensome. The problem is you need access to these metrics quickly before you agree to e-discovery parameters that are disproportionate.
Joe – Tell our audience a little more about what proportionality is and why it’s so important to start making proportionality arguments to reduce costs.
Joe – As I noted, legal teams need to quickly access data to understand if e-discovery parameters are proportional. How can legal teams get access to data faster?
Joe – Anything else to add?
Poll Question – Do you feel your organization has the technology to make persuasive proportionality claims?
Yes
No
Don’t know
Speaker: Seyi, Joe
Duration: 2-3 min
End of webcast
I’ll ask each of you for your key takeaways.
Speaker: Mike
Duration: 1 min
That will conclude our webcast for today.
As a reminder, we will be sending you a link to access the webcast recording, and slides. That email should make it to your inboxes a little later today so look for it.
For more information on anything from today’s presentation, please feel free to contact Antonio or myself. Our email addresses are listed on the screen right now. Should you wish to learn more about Exterro’s e-discovery software suite and how it can help address some of the processes described in the webcast today, please reach out to me directly and I would be happy to get you more information.
As I mentioned at the outset of the webcast, we ask that you stick around once we close out and complete a very short survey that will pop up on your screen automatically.
Thanks everyone for joining us. Have a great rest of your day.