Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


First Circuit Raises Troubling Questions
April 26, 2012
The First Circuit opinion in <i>Rosciti v. Insurance Company of the State of Pennsylvania</i> presents an increasingly common interplay between two often conflicting areas of law ' insurance coverage and bankruptcy.
Avoid Mistakes of the Past
April 26, 2012
This article discusses a number of cases to have considered officer and director fiduciary duties in the context of insolvency.
Dispelling (Some) of the Darkness of Stern v. Marshall's Bleak House
April 26, 2012
The Amended Standing Order issued by Judge Loretta Preska has significantly reduced the procedural quagmire and uncertainty faced by attorneys and the courts as a result of <i>Stern v. Marshall</i>. Here's why.
TOP 5 MYTHS OF ATTORNEY SELLING - PART II.
April 16, 2012
MYTH # 2 - Attorneys should step in to the business development process only after the marketing department develops a strategy. Ultimately, the onus is upon the attorneys to bring in (and keep) the business. The role of law firm marketing should support these goals with collateral materials, public relations activities, social media and identifying seminars and workshops that help facilitate network development. Once you have the information and sales training, plan a strategy to pursue the&#133;
IT BOILS DOWN TO ONE CLIENT AT A TIME
April 03, 2012
Here's a little secret about professional services marketing. It always comes down to selling the individual clients ' one by one. And it doesn't matter if your firm is the largest or the smallest.
Top 5 Myths of Attorney Selling
March 30, 2012
MYTH #1: BUSINESS DEVELOPMENT AND LAW FIRM MARKETING ARE INTERCHANGEABLE TERMS Law firm marketing is about being found, not chosen. How you get found is through publicity, media outreach, networking, collateral materials, conducting and attending workshops. These tactics are the eyes, ears and interests of your potential client. But first you have to locate the target -- that's business development. Perhaps a more appropriate term for business development is "business generation," which requires (dare I write it)&#133;
<B><I>Online Exclusive:</b></i> <b>House Rejects Facebook Password Amendment</b>
March 30, 2012
The U.S. House of Representatives rejected a proposed amendment to the Federal Communications Commission Process Reform Act of 2012 (H.R. 3309) that would have allowed the FCC to prevent employers from asking for social networking passwords from prospective employees.
iPad, Laptop or Both?
March 30, 2012
In this article, I make some general observations and then rate my iPad against my laptop in seven different categories of tasks.
Product Review: Onit
March 30, 2012
Market statistics across all industries, including professional services, reveal that cloud products will drive the automation train. This is particularly true of Software-as-a-Service (Saas) products designed for small and medium-sized businesses.
Helpdesk Lessons Learned From Software Conversions
March 30, 2012
Here's some not-so-breaking news from the world of major software conversions regarding, in particular, the amplified demand for Office 2010 upgrades within the last 9 to 12 months: It's an all around challenge and major resource issue for IT, the helpdesk (referred to as the service desk globally), trainers and users. So, prepare for it, absorb lessons from others who have gone before you, and achieve a smooth conversion with happy users and management (yes, this IS possible!).

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›