Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • While the call for tort reform is a continuing cry by opponents of our civil justice system, the necessity for, and the scope of, reform remains largely debatable.

    May 29, 2012Larry E. Coben
  • There's a new legal model in town ' ushered in by a new era of law firm client ' requiring firms to streamline operations and capture cost efficiencies at every level while also maintaining the high quality of services on which their reputations are staked.

    May 29, 2012Robert C. Mattern
  • When you send a document to someone electronically, what's your preferred tool? Do you turn to File Transfer Protocol (FTP)? Or perhaps a thumb drive? For many lawyers and legal professionals (and this won't come as a surprise), the go-to tool is e-mail. It is easy and lawyers get it. But from an IT perspective, e-mail poses many problems.

    May 29, 2012Susan Whitmire
  • If the firm of the future is to compete successfully, the role of the professional is to be aware of the need for thoughtful and professional competition, and to be educated in the skills of competitive marketing.

    May 29, 2012Bruce W. Marcus
  • Growing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.

    May 29, 2012Danny Meier
  • Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.

    May 29, 2012Karl G. Nelson and Michael D. Y. Sukenik
  • Smartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.

    May 29, 2012Gavin W. Manes and Tom O'Connor
  • Despite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.

    May 29, 2012David J. Kessler