Law Journal Newsletters

An ALM Website

LEGAL TECH NEWSLETTER

May 2015

Securing a Document Review Center: A Practical Guide

By Michel Sahyoun

Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives. Read More...

Legal Incubators and Legal Hackers

By Dan Lear

Legal training in law schools prescribes an unflinching adherence to precedent. This paradigm is further reinforced in most traditional legal practice settings. In contrast, the legal hacking ethos directly attacks the rigidity of the precedent-based mindset. Legal hackers don't think: "what's been done before?" but instead "what can we do now?" Read More...

The Changing Face of Legal Research

By Daniel J. O'Rielly

Executing a powerful business development plan is a challenge every attorney faces. For attorneys at small firms and with solo practices, doing it without breaking the bank is one of the biggest hurdles to a thriving practice. Read More...

Why Upgrade Your iPad, iPhone to iOS 8.3?

By John Edwards

Apple Inc. recently released iOS 8.3, an update to its iPhone/iPad operating system. Far from a minor "maintenance" release, iOS 8.3 includes an array of fixes and features that make iPhones and iPads more useful, reliable and secure. Read More...

From Our Blogs

MOST POPULAR ARTICLES

MARKETING the LAW FIRM

Transitioning Associates from Worker Bees to Rainmakers

There comes a day when the partners of your law firm will tell their associates that they need to build their own clientele. If you are the associate, this is a chilling moment. And if you are a marketing professional, here is how you can help.

LEGAL TECH NEWSLETTER

Securing a Document Review Center: A Practical Guide

Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.

Tweets