From Bill Jensen’s decades long research on strategic change and communications he has derived clear actionable components for communicating behavioral change to employees.
This guide by legal tech expert Catherine (Sanders) Reach is a must-read for every Outlook user seeking to implement value added features and functions that are currently underused, or not used at all. Many of us spend a good portion of our day in Outlook, receiving and responding to email, sending and filing attachments, scheduling appointments, responding to meetings, and updating contacts. Sanders Reach identifies key shortcuts, tools and techniques already built into application, as well as third-party add-ins, to help manage your communications much more effectively.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The 5 Best Authenticator Apps for Protecting Your Accounts; Major US companies breached, robbed, and spied on by Chinese hackers; US Army bans soldiers from using TikTok over security worries; and 7 types of virus – a short glossary of contemporary cyberbadness.
This is part one of an article by Marc Solomon calling on readers to be alert and respond effectively to critical and ongoing challenges – BS Detection in a World of Fake News and Real Threats.
Attorney, award winning legal blogger, legal journalist and legal technologist Robert Ambrogi shares his vast knowledge and insights for crafting effective blog postings. Every blogger will benefit from reading and applying his suggestions to improve content, format and overall value to effectively deliver accurate, reliable, relevant knowledge sharing and to leverage subject matter marketing expertise.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: What Would Happen If the Internet Went Down … Forever?; Resources for Measuring Cybersecurity; For Better or Worse, Blockchain Birth Certificates Are Officially Here; and Apple Warns Older iPhones May Stop Working Sunday Without Software Upgrade.
Bill Jensen’s fascinating interview with Prof. Sohail Inayatullah, UNESCO Chair in Future Studies at UNESCO and USIM, focuses on the future of work, leadership and the significance of the Key Performance Indicator [KPI].
How women’s life-long experiences of being judged by their appearance affect how they feel in open-plan offices
Dr. Rachel Morrison identifies and discusses research respective to open-plan workspaces. Her conclusion is that female and male employees differ in their perceptions of being observed and this fact should be acknowledged and incorporated into office design.
The long heralded death of fax machines has yet to materialize as doctors, pharmacists, state, local and federal government, to name just a few groups, continue to rely on systems that originated in the 19th century. Nicholas Moline, a member of Justia’s Engineering team identifies multiple ways that faxes continue to be used in law firms.
Earlier this year Ron Friedmann presented an interactive session on how law firm libraries can create new value, at the Ark conference Best Practices & Management Strategies for Law Firm Library, Research & Information Services (aka Ark Library). In this article he shares some session highlights, the voting results of the interactive portion, his slides and and a link to his live presentation.