Do you have an office job that lets you work remotely? If you do, chances are you work not so much on your computer as you do through a secure “tunnel” into your company’s servers. Whether you use Windows or a Mac the work environment appears as
Read more →Years ago, I regularly taught my then-employer’s clients how to configure my employer’s client software. To do so, I had to explain what a server’s IP address and port number are. Here’s the explanation I used: When you send a letter to a friend who lives in
Read more →Given various forms of bluster coming from the United States government these days, people can be forgiven for losing track of issues at play in Washington. Here’s one that, IMHO, could affect the world more than most: the repeal of net neutrality laws. You might be thinking: what’s
Read more →Late last year, I took the advice of a friend and upgraded to Microsoft Office 365. I regret that decision. I lean mostly on Word, and until I upgraded to 365 I had no idea how much I depended on Word simply being a canvas that I
Read more →Automakers vet suppliers exhaustively. One faulty part in a vehicle can cost the automaker dearly, and not just in cash. This need to vet applies to any vendor relationships, including those between companies and law firms. Outside legal help functions as an extension of in-house legal departments.
Read more →Your company installed video surveillance equipment. You’re the boss. One day, you see an employee knocking off early. You intend to discipline that employee using video evidence. Lawyer Mark Hayes thinks that’s a bad move.
Read more →Many people use free email services and social networks without much thought as to why they’re free. There may be a grudging acceptance of companies using information about you in their marketing efforts. (Conspiracy theorists spell out more nefarious motives.) John Ellis follows this topic more closely
Read more →Why is your computer so slow? That might be the wrong question to ask. Sometimes it isn’t your computing device (computer, tablet, etc) that’s at fault. Our computing environments grow ever more dependent on fast Internet connections. This is especially true if much of what you do occurs online and
Read more →Lawyers often reach their work product using data networks. The speed and reliability of those networks can affect their productivity. At the same time, network security can determine whether lawyers keep client information confidential — or not.
Read more →Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can
Read more →