Category «KM»

Pete Recommends – Weekly highlights on cyber security issues July 19, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trump is rattling sabers in cyberspace — but is the U.S. ready?; Casting the Dark Web in a New Light; Army researchers develop metrics for cyber defenders’ agility; and How To Clear Out Your Zombie Apps and Online Account.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Health, Internet Trends, KM, Privacy

LLRX New Issue May – June 2019

Articles for May – June 2019

LLRX Continuing Education and Knowledge Services Links – updated regularly

LLRX.com® – the free web journal on law, technology, knowledge discovery and research for Librarians, Lawyers, Researchers, Academics, and Journalists. Founded in 1996.

Subjects: KM

Five data lies that need to die … now streaming on Netflix

Using Netflix as an example and referencing a number of articles touting the company’s expert use of data analytics and algorithms, marketing savant Jason Voiovich argues that data helps make content decisions, but alone does not alone drive the decisions. Data is one asset among many – but humans decide what counts in the analysis. As data analytics increasingly drive corporate decision-making in all sectors, the lessons Voiovich highlights are critical to effective, accurate and responsible business practices.

Subjects: AI, Information Management, KM, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues June 22, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: It’s Time to Switch to a Privacy Browser; Adobe Develops Tool to Identify Photoshopped Images of Faces; Millions of Business Listings on Google Maps Are Fake and Google Profits; and Protect your online identity now: Fight hackers with these 5 security safeguards

Subjects: AI, Civil Liberties, Cyberlaw, Cybersecurity, Email Security, Internet Trends, KM, Legal Research, Privacy, RSS Newsfeeds, Search Engines, Search Strategies, Social Media, Technology Trends

Harness the Melodic Robotic Voices of Our Eventual Overlords Now to Improve Your Proofreading!

As writer/editor for more than two decades, Sarah Gotschall’s article immediately piqued my interest. Gotschall writes that when she proofreads her own work product, she is doing so with what she think she wrote in mind, rather than than focusing specifically on the words on the page. The addition of Speak command to your Quick Access Toolbar in Microsoft Word will be of interest to writers, editors, researchers, librarians, InfoPros, students, and marketing folks too.

Subjects: Communication Skills, Communications, Grammar, KM, Legal Marketing, Software, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues June 16, 2019

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Artificial intelligence-enhanced journalism offers a glimpse of the future of the knowledge economy; China Summons Tech Giants to Warn Against Cooperating With Trump Ban; New RCE vulnerability impacts nearly half of the internet’s email servers; and NARA Considers Blockchain to Verify Records Amid Rise in Deepfake Videos.

Subjects: AI, Cybercrime, Cybersecurity, E-Government, Economy, Email, Email Security, KM, Privacy

3 Ideas To Future-Proof Your Law Firm

Nicole L. Black’s article is a call to action: ready or not, the legal marketplace is changing and 21st century legal clients are increasingly demanding that their lawyers use technology to increase efficiency and provide more accessible, affordable legal services. How does your law firm compare? What steps is your firm taking to set the stage for success in the new world order? Nicole delivers a road map that firms can use the benchmark their current and moving forward efforts.

Subjects: KM, Legal Technology, Privacy, Technology Trends

Casetext’s New ‘SmartCite’ Citator Is Its Clever Answer to Shepard’s and KeyCite

Robert Ambrogi writes – “Knowing whether a case is good law is elemental to legal research. To do this, lawyers have long relied on citator services such as Shepard’s from LexisNexis and KeyCite from Westlaw. Now, the legal research service Casetext has introduced a citator of its own, called SmartCite, with many of the features you would expect to find in a citator, plus some that make it unique.”

Subjects: AI, Citators, KM, Legal Research, Legal Technology, Technology Trends

Terms, Tags, and Classification

It is helpful to classify documents or other content items to make them easier to find later. Searching the full text alone can retrieve inaccurate results or miss appropriate documents containing different words from the words entered into a search box. A document or content management system may include features for tagging, keywords, categories, indexing, etc. Taxonomist Heather Hedden identifies the difference between these elements to facilitate the implementation of more effective knowledge and content management.

Subjects: Business Research, Case Management, Competitive Intelligence, E-Discovery, Information Architecture, Information Mapping, KM