FYI
Insights on Technology and How We Use It
What RIGHT about Artificial Intelligence?
While AI has its challenges, there’s a bright side to it. Just like any technology, it’s not inherently good or bad. Sure, it has flaws, but AI can also help us do amazing things. It can boost our skills, spark new ideas, and give businesses a competitive edge and more.
Organizational Project Management for Law Firms
Who doesn’t want to be successful? To have repeatable and controllable success is the promise of good project management. Such promises don’t come easy though. It takes good practices and procedures that are consistently applied, measured and reviewed - this is the hallmark of mature organizational project management (OPM).
Seeing is No Longer Believing - The Rise of Deepfakes
Will an increasing amount of deepfakes — deceptive images, content, and videos often created by AI and floated on the internet — start making us doubt our own eyes?
Will AI Replace Lawyers?
AI is rapidly transforming numerous industries, including the legal field. AI-powered solutions streamline workflows, automate mundane tasks, and enhance efficiency, saving both time and resources. However, a new wave of AI is taking the world by storm.
Are Smartphones Too Powerful?
A single modern smartphone could be used to guide more than 120 million Apollo-era spacecraft to the moon — all at the same time! Is this too much power? While smartphones can be innovative and productive tools that allow lawyers and other professionals to stay connected, employers should be aware of the potential pitfalls
From Wearable to Embedded – How Technology is Literally Becoming Part of Us
Technology has moved from the desktop to the laptop to the handheld to now embedded with our bodies. With each move, it becomes a more personal and intimate part of both our business and personal lives. Today’s technology is now wearable and soon embedded in our bodies – becoming even more intimate and central to our lives.
Zero Trust - Never Trust, Always Verify
Zero trust cybersecurity protocols may enable law firms and other organizations to create a more resilient protection network, but how do they get there?
Ransomware Attack - What Really Happens and How to Survive
What really happens? What steps can companies and law firms take to better survive a ransomware attack? Prior planning and open communication with all stakeholders is a good start.
The Internet of Behavior - Can It Really Change Us?
As we evolve toward the Internet of Behavior, will people be able to accept being monitored, tracked, and analyzed with a mix of data technology and behavioral science?
The Rise of “Anywhere” Operations
Working from Home is changing how law firms work. This is a look at the new concept of "Anywhere” Operations and how law firms need to get behind this latest development in remote working
Legal Project Management Maturity - How Mature is Your Firm?
Who doesn’t want to be successful? To have repeatable and controllable success is the promise of good project management. This article takes a look at the different levels of project management maturity and what that means to law firms.
Achieving Cybersecurity Maturity In Your Law Firm
Law firms can achieve a level of cybersecurity maturity that allows them to detect & contain a cyber-threat before it even has a chance to disrupt business.
Optimizing Legal Project Management: Can you do the Kanban?
Can a stack of sticky notes, a pen, and a blank wall revolutionize your firm’s legal work? Kanban, a visual system for legal project management, may do just that.
Method Melding: The Modern Melting Pot of Project Management
Add a smidgen of Agile, dust with a hint of Waterfall, and add a large dollop of Scrum, and you’ve got a modern project. In years past, you would have had to choose a single methodology to get a project done, but increasingly in today’s world, you can select additional project methodologies that will help you get the job done better.
Fighting Back Fast: Artificial Intelligence Comes to Cybersecurity
Recently, more than $240,000 was stolen by someone pretending to be an executive at a British energy company. This event does not seem all that out of the ordinary, except that the executive was not a real person. Thieves used voice-mimicking software in order to imitate the real executive. And they got away with it. This scam was enabled by artificial intelligence (AI) that was used to create a realistic deep-fake imitation. It is being called the world’s first AI heist.
Can a Machine replace an Attorney?
We are at the beginning of a new machine age. Intelligent computing is being successfully applied to many areas of manufacturing, banking, medical, investing and legal work and it will only grow. How will law firms adapt? Can legal work be done by a machine?
The Rise of Enterprise Project Management
Projects fail for many reasons. Over the last decade many firms have created an internal project management office (PMO) to try to stem such failure. PMOs try to standardize how projects are managed and make them more predictable and successful. In the past few years a new and higher level of project management has emerged — the Enterprise Project Management Office (EPMO).
Ambient Computing: Technology is All Around
Computers are everywhere and have gotten smaller and faster. With easy availability of the Internet, these little and powerful computers grew to form an “Internet of things” collecting, processing and presenting useful information to us.
The Agile Lawyer - Project Management that Really Delivers
Traditional project management methods often require heavy upfront planning and can be difficult to apply legal matters. Agile Project Management (Agile) methods may be better suited to the fast-paced change seen in legal projects, and is a great way for law firms to deliver value to their clients more quickly and with less risk.
Security Awareness Education for the Mobile Workforce
We live in an age of high mobility. Mobile devices let us be productive and on the go. However, all this convenience and flexibility comes at enormous risk. Critical data can be at risk depending on where and how users use their devices. Mobile device use has become the weakest link to a firm's data security.