Similar Posts
What I’m Sharing (weekly)
Take Control of Your Learning at Work Five Tips for Staying Relevant in Your eDiscovery Role Stop The Insanity. Kill The Billable Hour. Interview: Wendy King of FTI Consulting on managing international eDiscovery with RelativityOne Balancing the Advantages and Security Risks of Collaboration Tools in the Legal Sector How law firms are becoming tech firms,…
Linked – LinkedIn Problems Run Deeper Than Valuation
“The problem stems from each of the company’s revenue streams, which ultimately diminish the business value of using the service. Whether it’s being paid to promote content, focusing on sales and recruitment over other professions, or interruptive advertising, these streams incentivise poor behaviour by individual users on the site. In other words, LinkedIn’s business model…
Linked – How to Retain Your Best Employees
“Be Clear in Your Communication: You always have to be transparent when communicating with your employees. Even if the news are bad, you should still clearly talk with your employees and explain them what is going on within the company. Create time to listen to your employees’ concerns and do your best to solve them….
GMDesk
Over the long weekend, I downloaded and tried out the Adobe Air application, GMDesk: GMDesk is an application that lets you run Gmail, Google Calendar, Google Docs and Google Maps as a stand-alone application to do all your mail handling, calendar event reading etc with. No need to open it up in a web browser,…
Linked – Boy and His Teddy Bear Wow Cybersecurity Experts
“(NEWSER) – It’s possible the experts in attendance Tuesday at a cybersecurity conference in the Netherlands didn’t know what to make of 11-year-old Reuben Paul when the sixth-grader from Texas took the stage. But by the end of his presentation, they were tweeting compliments like “respect” and “the future of cybersecurity,” Mashable reports. According to…
Linked – Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net
The growing supply of IoT malware is creating a tipping point in the denial-of-service domain that’s giving relatively unsophisticated actors capabilities that were once reserved only for the most elite of attackers. And that, in turn, represents a threat to the Internet as we know it. “The biggest threats as far as I’m concerned in…
