Monthly archives: September, 2018

Book Review of “Frenemies: The Epic Disruption of the Ad Business (and Everything Else)”

Advertising is now part of a complex ecosystem that engages a wide range of components, including but not limited to: social media, Big Data, AI, data mining, competitive intelligence, and marketing. Alan Rothman reveals and explains for readers just how utterly different and hyper-competitive advertising now is, with work product largely splayed across countless mobile and stationary screens on Planet Earth. Rothman describes how expertly chronicling and precisely assaying the transformative changes happening to this sector is an informative and engaging new book, Frenemies: The Epic Disruption of the Ad Business (and Everything Else), by the renowned business author Ken Auletta. Just as a leading ad agency in its day cleverly and convincingly took TV viewers on an endearing cultural tour of the U.S .as we followed the many ad-ventures of Bartles & Jaymes, so too, this book takes its readers on a far-ranging and immersive tour of the current participants, trends, challenges and technologies affecting the ad industry. Auletta’s book is not only timely and insightful, but demonstrably valuable for the professionals in the legal sector who are striving to effectively engage, employ and measure the value of marketing to clients and potential clients in a rapidly changing environment increasingly dependent upon using big data and analytical platforms.

Subjects: AI, Big Data, Blockchain, Book Reviews, Communication Skills, Communications, Competitive Intelligence, Law Firm Marketing, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues September 29 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Be careful about what you post on social media [really]; Overruling Constitutional Precedents; and If Your Data is Found on the Dark Web, Firefox Monitor Will Let You Know.

Subjects: Big Data, Civil Liberties, CRS Reports, Cybercrime, Government Resources, Health, KM, Privacy, Search Engines, Social Media, Supreme Court

Pete Recommends – Weekly highlights on cyber security issues September 22 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: 10 Investigative Tools You Probably Haven’t Heard Of; How to Safely Pay for Goods and Services With Someone You Don’t Know; and The Best Browsers of 2018: Chrome, Firefox, Edge, and More Tested.

Subjects: Cybercrime, Cybersecurity, Disaster Planning, Internet Resources, RSS Newsfeeds, Social Media, Travel

Text Analysis Systems Mine Workplace Emails to Measure Staff Sentiments

Giving the processes of observation, analysis and change at the enterprise level a modern spin, is a fascinating new article in the September 2018 issue of The Atlantic, titled What Your Boss Could Learn by Reading the Whole Company’s Emails, by Frank Partnoy. Alan Rothmam summarizes and annotates this article that raises timely and significant issues around privacy, data mining and organizational management. Rothman concludes his review by posing important questions concerning the impact of text analysis data on executive training and development and on employee performance.

Subjects: AI, Data Mining, Email, Employment Law, KM, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues September 15 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Verizon data breach digest lifts the lid on theft tactics; Samsung SmartThings Tracker Locates People, Pets, and Things; and Who controls your data?

Subjects: Big Data, Cybercrime, Cyberlaw, Cybersecurity, Government Resources, Privacy

Exploring the global LegalTech ecosystem

Fueled by a combination of mushrooming LegalTech startups, an increasing interest from corporate legal departments, law firms looking into LegalTech strategies and most importantly, the legal media, LegalTech has come in the legal industry’s mainstream consciousness. Headline grabbing articles like “Machines are going to replace lawyers” or “Robo-lawyers are here to take your jobs” have become du jour. As an industry analyst, Eric Chin goes beyond the buzz to explore the state of the global LegalTech market by gauging size, funding and corporate activities across different jurisdictions.

Subjects: KM, Law Firm Marketing, Legal Technology, Technology Trends

Three TextExpander Snippets You Should Be Using to Save Time Immediately

Brett Burney recommends and demonstrates an application from which we can all benefit: Text Expander – its saves you time immediately because it can type for you. And not only does TextExpander save you time, but it’ll also make you a better typist because it’s 100 percent accurate every single time. No typos or misspellings.

Subjects: Email, Information Management, Technology Trends

A Quick Guide to Searching the Web

Web research expert Marcus Zillman’s new quick guide is a valuable resource for those who continue to rely on just one search engine for all their search requirements. Zillman’s goal is to offer readers who are not necessarily highly proficient in web research a selected and effective group of resources from which to choose to conduct searches as well as to engage in knowledge discovery. The article also explains and suggests alternative methods and techniques that you can immediately apply to your research to obtain more comprehensive, actionable results.

Subjects: Internet Resources, Internet Resources - Web Links, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues September 8 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Effort to undermine American democracy/US Elections “has not stopped,” former Facebook security chief says; How to Use Google Privacy Settings – and – U.S .accuses China of ‘super aggressive’ spy campaign on LinkedIn.

Subjects: Civil Liberties, Cybersecurity, Economy, Intellectual Property, Privacy, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues September 1 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlights of this week’s column: Woman Sues Border Agents to Make Them Return Data They Seized From Her Phone – and How Yahoo Is Mining For Gold in Your Junk Mail.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Email, Government Resources, Privacy
CLOSE
CLOSE