Sometimes Apple’s Mail.app doesn’t perform the way you want it to. This can happen for several reasons. Here are two common methods you can use to troubleshoot and fix Mail problems.
Read more →On June 11, 2016, I had the pleasure of presenting tips on how to empty your inbox at the Editors Canada national conference in Vancouver. Despite mine being the final time slot of the day, I think I managed to keep too many people from yawning. I presume
Read more →Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can
Read more →Whenever I send people an email, chances are it either arrives in their inboxes or, in a small minority of cases, their spam filters reroute it to their spam boxes. One or the other. Emails just don’t get lost in transit. I’d expect the same thing to happen with
Read more →In certain situations, I need to type something I’ve typed dozens or hundreds of times before. Rather than type it out, I prefer to type three to four letters. My Mac recognizes those letters and offers me the option of the full text I’ve typed in the past.
Read more →When junk mail arrives in your mailbox, do you keep it? If you’re like most people, probably not. Into the recycling bin it goes, moments after you recognize it. For some reason I haven’t yet figured out, many people aren’t as ruthlessly efficient when they receive electronic junk
Read more →For a moment, disregard the message at the top of this email, the one that says “You marked this message as Junk Mail.” (I did that before realizing I could craft a blog post from this email.) Does this message look legitimate to you? How would you handle it?
Read more →Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of
Read more →