<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>edisclosure myth or reality? &#187; Technology</title>
	<atom:link href="https://jollyvip.com/edisclosure/category/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/edisclosure</link>
	<description>From litigation to the arbitration regime</description>
	<lastBuildDate>Tue, 01 Jul 2025 10:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>open source ediscovery</title>
		<link>https://jollyvip.com/edisclosure/2012/10/23/open-source-ediscovery/</link>
		<comments>https://jollyvip.com/edisclosure/2012/10/23/open-source-ediscovery/#comments</comments>
		<pubDate>Tue, 23 Oct 2012 19:05:42 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Collaboration]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[FreeEed.org]]></category>
		<category><![CDATA[Open Source]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=430</guid>
		<description><![CDATA[Last summer I posted this &#8211; collaboration coming from open source . Looks like there is now a forum setup to spearhead the open source (code engine) for ediscovery. The FreeEed.org invites folks to join in the movement. I guess even law firms (not sure about lawyers themselves) are welcome, as noted that DLA Piper [...]]]></description>
			<content:encoded><![CDATA[<p>Last summer I posted this &#8211; <a href="http://jollyvip.com/edisclosure/2011/06/19/more-collaboration-coming-from-open-source/" title="open source 2011" target="_blank">collaboration coming from open source </a>.</p>
<p>Looks like there is now a forum setup to spearhead the open source (code engine) for ediscovery. The <a href="http://freeeed.org/" title="freeEed.org" target="_blank">FreeEed.org</a> invites folks to join in the movement. I guess even law firms (not sure about lawyers themselves) are welcome, as noted that DLA Piper is <a href="http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202572470183&#038;OpenSource_EDiscovery_Foundation_Emerging" title="law.com" target="_blank">supporting open source software</a>.</p>
<p>See you there!</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/10/23/open-source-ediscovery/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Idiot&#8217;s Guide or Dummies Book</title>
		<link>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/</link>
		<comments>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/#comments</comments>
		<pubDate>Wed, 03 Oct 2012 06:12:04 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Books]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[book]]></category>
		<category><![CDATA[predictive coding]]></category>
		<category><![CDATA[symantec]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=422</guid>
		<description><![CDATA[The most difficult aspect of edisc(overy)/(losure) is writing a definitive, complete book covering all the elements of edisc that satisfies everyone or is suitable for general release. So, will a Dummies Guide or an Idiot’s Guide to edisc make it to this year Xmas book list? Perhaps an unlikely Xmas event. What has been stated [...]]]></description>
			<content:encoded><![CDATA[<p>The most difficult aspect of edisc(overy)/(losure) is writing a definitive, complete book covering all the elements of edisc that satisfies everyone or is suitable for general release. So, will a Dummies Guide or an Idiot’s Guide to edisc make it to this year Xmas book list? Perhaps an unlikely Xmas event.</p>
<p>What has been stated is that the review process is the most expansive aspect of edisc (i.e. expansive labor and time and voluminous document). So much so that predictive coding is now not only a tool used for the review process but also has become a topic of its own in the US courts.  Is the review process also the most difficult of the edisc process?  If you answer ‘yes’ or ‘no’, why do we need predictive coding?<br />
Perhaps some answers (hopefully with relevant questions raised too) will appear in the new book <a href="https://symantecevents.verite.com/tpc " title="Predictive Coding for Dummies book - symantec" target="_blank">Predictive Coding for Dummies book.</a></p>
<p>I wonder why there are no Dummies or Idiot’s Guide to the review process, instead one on predictive coding. I guess it is easier to write about a piece of tool/technique and not too easy to write on the review process or not profitable enough to do so.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/10/03/idiots-guide-or-dummies-book/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>reigniting on computing stuff</title>
		<link>https://jollyvip.com/edisclosure/2012/06/26/reigniting-on-computing-stuff/</link>
		<comments>https://jollyvip.com/edisclosure/2012/06/26/reigniting-on-computing-stuff/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 12:26:58 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Language]]></category>
		<category><![CDATA[simplicity]]></category>
		<category><![CDATA[simplification]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Go language]]></category>
		<category><![CDATA[insuredatarisk]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=329</guid>
		<description><![CDATA[I had on my list-to-do to consolidate this blog with my new websites at www.iadrt.com and www.insuredatarisk.com. I have not figure out a &#8216;neat&#8217; or simple way to consolidate not only this blogging site (which was my 1st WordPress attempt) but to simplify my twitter accounts which I have three twitters. I guess it all [...]]]></description>
			<content:encoded><![CDATA[<p>I had on my list-to-do to consolidate this blog with my new websites at <a href="http://www.iadrt.com" target="_blank">www.iadrt.com</a> and <a href="http://insuredatarisk.com/" target="_blank">www.insuredatarisk.com</a>. I have not figure out a &#8216;neat&#8217; or simple way to consolidate not only this blogging site (which was my 1st WordPress attempt) but to simplify my twitter accounts which I have three twitters. I guess it all boils down to what I want to do with all these &#8216;stuff&#8217;.</p>
<p>This morning I saw a tweet which caught my attention, a twitter I recently added to my <a href="https://twitter.com/#!/insuredatarisk" target="_blank">@insuredatarisk</a> account. This account is for all &#8216;stuff&#8217; related to computing stuff. Computing stuff in my vocabulary includes data or cyber risk, processes, agile, computer or information security, people in computing and anything else that &#8216;bugs&#8217; me to my core or rather anything that ignites my interest in computing. After all I choose to study mathematics and computing and not music (always wanted to play classical guitar) or medicine (which was what my dad wanted!).</p>
<p>Lately I have been reflecting on why I cannot let &#8216;GO&#8217; of my interests in computing stuff even after spending most of last 10 years exploring other fields like law, dispute resolution and my interests in energy healing and yoga. I guess I will never know why, the same reason as why I choose mathematics and computing as my 1st degree even though I have not done computing in my college subjects. Something &#8216;bugs&#8217; me then and still manages to continue to &#8216;bugs&#8217; me now.</p>
<p>I wonder why folks don&#8217;t talk about &#8216;bugs&#8217; anymore, instead they use &#8216;errors&#8217; like the software update errors that caused and still causing the RBS banking service downtime.  Will there be blogs from computing folks about how such errors can occur? Perhaps not, as such errors are not interesting &#8216;bugs&#8217; to expose.</p>
<p>I just read this blog -<a href="http://bit.ly/MWNPK2"> less is exponentially more</a> &#8211; and the &#8216;bugs&#8217; got me to blog today and got me thinking about my effort to consolidate my sites.</p>
<p>For now, I will keep things &#8216;simple&#8217; until I have figure out a way to simplify my many bugging interests.</p>
<p>A bug for thought &#8211; surely RBS has a business continuity or business recovery plan. Mmm…maybe they do have computer recovery planning but can&#8217;t execute the plan. Like having an ediscovery/edisclosure plan is simple enough. The buggy bits are in the execution, which ain&#8217;t that simple.  Is there a similar &#8216;Go&#8217; plan to execute that is simple to the core?</p>
<p>More bugs to ponder&#8230;</p>
<p>oops my categories have disappeared from this site! More bugs to look into.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/06/26/reigniting-on-computing-stuff/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>computer security to security intelligence</title>
		<link>https://jollyvip.com/edisclosure/2012/06/26/computer-security-to-security-intelligence/</link>
		<comments>https://jollyvip.com/edisclosure/2012/06/26/computer-security-to-security-intelligence/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 00:48:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[IAAC]]></category>
		<category><![CDATA[information assurance]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=325</guid>
		<description><![CDATA[Last week I attended the Information Assurance Advisory Council (IAAC) workshop held at the BCS Office in London. The workshop papers will be published at the IAAC site. The main topic was ‘Consumerism: Same old IA Issues … or not?’.  The presentations were diverse and the attendees’ perspectives were diverse too. A pity I had [...]]]></description>
			<content:encoded><![CDATA[<p>Last week I attended the Information Assurance Advisory Council (IAAC) workshop held at the BCS Office in London. The workshop papers will be published at the <a href="http://www.iaac.org.uk/events/workshops.html">IAAC site</a>. The main topic was ‘Consumerism: Same old IA Issues … or not?’.  The presentations were diverse and the attendees’ perspectives were diverse too. A pity I had to leave just before the closing remarks and missed the concluding of the workshop.</p>
<p>The definition of information assurance is given as <em>‘Information Assurance (IA) is the confidence that the information assets within an organisation are reliable, accurate, secure and available when required’</em>. Worth noting that in ediscovery, the confidence that information is available when required is not assured.</p>
<p>It seems (to me) that IA is not a common or widely understood or used term in the business or corporate world at large.  Similarly in the software development world, IA is not part of the design vocabulary. I wonder why…</p>
<p>According to Prof Brian Collins (one of the presenters), IA started life as computer security. To me, the term computer security itself is now replaced (or misplaced?) by cyber security.  One of the unintended consequence with the consumerism (of IT), which I refer to as the exploitation of IT, is that the knowledge gap between the consumers of IT and exploiters of IT is blurring at the vast sea of information. It is blurring as information is branded under business intelligence or security intelligence or even cyber intelligence. Where is IA?</p>
<p>Also, watch out for term such as &#8216;people assurance&#8217; (as mentioned by Prof Brian Collins). How to strike a balance between people assurance and information assurance?<br />
The IAAC workshops and seminars are worth watching out for, even though I am clueless on &#8216;people assurance&#8217;. Perhaps the clues are in the previous workshops/seminars.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/06/26/computer-security-to-security-intelligence/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The semantic web in practice</title>
		<link>https://jollyvip.com/edisclosure/2012/04/28/the-semantic-web-in-practice/</link>
		<comments>https://jollyvip.com/edisclosure/2012/04/28/the-semantic-web-in-practice/#comments</comments>
		<pubDate>Sat, 28 Apr 2012 16:07:46 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[paper.li]]></category>
		<category><![CDATA[The Data Chain]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=310</guid>
		<description><![CDATA[I recently came across a content curation service, paper.li and decided to use it to gather contents via my twitter. According to paper.li ‘they love the semantic web’, a great start for an online paper. Paper.li seems to use the twitter (or google+, facebook) handler/user to anchor the data stream and then allow tags/keywords to [...]]]></description>
			<content:encoded><![CDATA[<p>I recently came across a content curation service, paper.li and decided to use it to gather contents via my twitter.  According to<a href="http://paper.li/introduction.html"> paper.li</a> ‘<strong>they love the semantic web</strong>’, a great start for an online paper. </p>
<p>Paper.li seems to use the twitter (or google+, facebook) handler/user to anchor the data stream and then allow tags/keywords to search/pull for the tagged content across handlers and their contents. Paper.li then sifts, sorts and aggregates (i.e. curate the cluttered web?) into the typical paper-style categories, with one interesting aspect i.e. allowing user-defined tagged-categories. The semantic web put into practise?</p>
<p>I have three twitter accounts, one for fun/social/friends, one for Alternative Dispute Resolution (ADR) stuff, and one for ediscovery/edisclosure (edisc) stuff. So far, my edisc twitter has the largest followers and the largest klout. Currently my tags are cyber, agile, databreach, and cyberinsurance.  I wonder what my paper, <a href="http://paper.li/iadrt/1334938891">The Data Chain</a>, will reveal if I use tags on edisclosure and ediscovery. Since I have the largest followers on edisc stuff, I guess The Data Chain paper will be choked with edisc stuff.  These tags and also twitter lists will be use in the next edition of The Data Chain.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/04/28/the-semantic-web-in-practice/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>cloud computing</title>
		<link>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/</link>
		<comments>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/#comments</comments>
		<pubDate>Wed, 22 Feb 2012 23:28:07 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[right to be forgotten]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=290</guid>
		<description><![CDATA[Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud. Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. [...]]]></description>
			<content:encoded><![CDATA[<p>Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud.</p>
<p>Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. These established methods are still around, come cloud or no cloud. </p>
<p>I have heard references of cloud computing in terms of outsourcing or another way of addressing or outsourcing your computing costs. So folks also talk about cloud computing in terms of opex and/or capex. Is cloud computing new technology or another way to talk about outsourcing your computing costs?</p>
<p>After reading this excellent write up on <a href="http://www.katescomment.com/what-is-cloud-computing/">Cloud Computing</a>,  my initial skepticism on cloud computing turns into childish delight! Ah! It makes sense to have the 4 letters i.e. SaaS, PaaS, IaaS to describe cloud computing in terms of services. It seems that cloud computing does resemble outsourcing except that with outsourcing one is led to address business function/activities instead of computing services. My next question -what services are offered by cloud computing that will radically change the way I work or use technology? An ediscovery question in cloud computing &#8211; will (or is) cloud computing radically change (changing) the ediscovery scene?</p>
<p>Right now I can&#8217;t think of any (cloud) services except that I will have to figure out what data do I consider cloud worthy. This sounds familiar in outsourcing too. The same question as what is core to my business, I keep in control and not outsource also applies to cloud computing. At the lowest level, is data core to my business? A tough question or a non question! There will be established or seasoned/reasoned questions which are irrelevant in cloud computing.</p>
<p>Businesses outsource their core function as &#8216;core&#8217; is not an accounting concept or an IT concept. We don&#8217;t talk about core accounting costs or core computing/technological data or services. Do we?</p>
<p>It seems the focus is no longer on &#8216;core business&#8217; or even services. Cloud computing is driving the way we handle or our ability to handle data &#8211; period. The signs are around us e.g.  &#8216;Big Data&#8217; and &#8216;BYOD&#8217;.</p>
<p>I am not interested in what cloud computing delivers, it is what data to &#8216;outsource&#8217;/give up to cloud service providers.  There is data protection act (soon a law in itself) and privacy related concerns. It will be interesting to see whether the changes to the data regime will define further questions or will the changes redefine the way cloud computing is currently defined. I have not come across a piece of legislation that changes the way technology is defined (&amp; hence it&#8217;s course of design, development and deployment). It is a known fact that law plays catch up in terms of technology. The <a href="http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten">&#8216;right to be forgotten</a>&#8216; is probably the policy/rule makers&#8217; way of acknowledging that computing is beyond &#8216;legal codifying&#8217;. Perhaps the policy makers in mixing data protection with privacy wanted to recapture the concept of privacy as defined by Judge Thomas Cooley in 1888 &#8211; The Law of Torts 29 (2d ed. 1888) &#8211; &#8216;the right to be left alone&#8217;.</p>
<p>So where does this lead to in terms of ediscovery, which is also here to stay whether cloud or no cloud.</p>
<p>One term that comes to mind is disruption as in disruptive technology with the intended consequences and (perceived) benefits.</p>
<p>Cloud computing is disruptive technology/computing for ediscovery at many levels as it touches on several areas where ediscovery is weak (in terms of uncertainty or complexity in data access and processing). Similar to the concept of &#8216;core&#8217;, &#8216;control&#8217; and  &#8216;trust&#8217; are meaningless in disruptive technology. Meaningless in the sense that one invariably (even with contractual agreements in place) loses control of data (in the cloud). The issue with trust is &#8211; how can we trust cloud providers if we loses control of data?  Control of data and issues of trust are interlock or meshed up as seen in the measures to deal with data protection and privacy rights. The emphasis on &#8216;protect&#8217; data (as in data protection rather than &#8216;control&#8217; ) seems to have lost its lustre in the attempt to address privacy of individual in the non physical data world. </p>
<p>So it is back to &#8216;handling of data&#8217; which is essentially what we do when we do ediscovery. We &#8216;handle&#8217; &#8211; as this cover all aspects of accessing or processing &#8211; as it is human that handle the data not computer.If this is not the case, why do we have ediscovery rules (CPR) that has description of &#8216;how to do&#8230;&#8217; .  Like all changes in rules/law, there will be disruption initially. So it is safe to say, changes in the data regime will disrupt the ediscovery rules or more accurately further disrupt the handling of data.</p>
<p>Can we define data in terms of services? It&#8217;s like defining personal and sensitive data (or secret data/info) as services for cloud computing. Maybe we are getting there in terms of 4 letters, as data is 4 letters too.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It&#8217;s starting with B something</title>
		<link>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/</link>
		<comments>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/#comments</comments>
		<pubDate>Wed, 22 Feb 2012 01:58:26 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[byod]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=282</guid>
		<description><![CDATA[Have you notice that &#8216;B something&#8217; is back in fashion? &#8216;Big Blue&#8217; in the 70s or is it in the 80s? Now we have &#8216;Big Data&#8217; and &#8216;BYOD&#8217;. In the ediscovery world, these two &#8216;B something&#8217; not only add extra vocabulary but also highlighted that data is &#8216;Big-ish to the petra super server level&#8217; and [...]]]></description>
			<content:encoded><![CDATA[<p>Have you notice that &#8216;B something&#8217; is back in fashion?<br />
&#8216;Big Blue&#8217; in the 70s or is it in the 80s?<br />
Now we have &#8216;Big Data&#8217; and &#8216;BYOD&#8217;.</p>
<p>In the ediscovery world, these two &#8216;B something&#8217; not only add extra vocabulary but also highlighted that data is &#8216;Big-ish to the petra super server level&#8217; and also &#8216;small-ish to the device level&#8217;.</p>
<p>Where do we start?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/02/22/its-starting-with-b-something/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>to do with technology or not?</title>
		<link>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/</link>
		<comments>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/#comments</comments>
		<pubDate>Thu, 18 Aug 2011 13:57:45 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[collusion of]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Barcelona]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sociotech]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=251</guid>
		<description><![CDATA[Is everything I do, to do with technology? When I am asleep, I guess I have nothing to do with technology unless I am in a technological related dream. This will probably be the end of my spirited being. Here is an interesting question (or a dream question?) raised by someone at the Sociotechnology and [...]]]></description>
			<content:encoded><![CDATA[<p>Is everything I do, to do with technology?</p>
<p>When I am asleep, I guess I have nothing to do with technology unless I am in a technological related dream. This will probably be the end of my spirited being.</p>
<p>Here is an interesting question (or a dream question?) raised by someone at the Sociotechnology and Knowledge Development (sociotech) Group. I see nothing wrong in raising the question in my blog here. Any objections and concerns, please post here or contact cher at iedisc.com</p>
<p>Gosh! has technology got me to be so so cautious?!</p>
<p>The question coming from the sociotech group:</p>
<p><strong><em>What do we really mean by technology?</em></strong></p>
<p>This question sound similar to several questions raised by law/policy makers during an ediscovery conference I attended in 2009 in Barcelona.</p>
<p>Substitute the word <em><strong>‘technology’</strong></em> with <strong><em>‘processing’ or ‘privacy’ or ‘consent’</em></strong> (as in data protection), we end up with more dreamy questions with little common understanding or agreement, especially when discussing on ‘what are the real issues with cross border ediscovery?’.</p>
<p>The questions were based on this statement (or an opinion?):</p>
<p>There is no legal basis (or justification) for ‘processing’ which includes transferring, viewing, accessing etc, of data in ediscovery across the Atlantic (i.e. the Europe &amp; US divide). What? No viewing, i.e. I can’t even open-view the file/data !</p>
<p>I guess the answers were not in the questions being raised, as the only answer that the policy makers were seeking to get assurance is: ‘how safe is my (personal) data’?</p>
<p>So, <strong><em>‘What do we really mean by technology?</em></strong>’</p>
<p>My dreamy reply: ‘technology’ is a beast and also a non beast, a thing and also a thingy.</p>
<p>What is your view(s)?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/08/18/to-do-with-technology-or-not/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>e-discovery process in SoLoMo</title>
		<link>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/</link>
		<comments>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/#comments</comments>
		<pubDate>Wed, 22 Jun 2011 17:45:52 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[ServiceProviders]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[IBM]]></category>
		<category><![CDATA[SoLoMo]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=246</guid>
		<description><![CDATA[The new order of data -  SoLoMo for social, local, mobile data. Now this is what I call  &#8216;ediscovery rhyme&#8217; ! Does this mean that Cloud Computing is now passé? To quote Paknad in the news at law.com: &#8220;There&#8217;s no easy button, there&#8217;s just complex and more complex buttons.&#8221; Complex buttons leading to more sore [...]]]></description>
			<content:encoded><![CDATA[<p>The new order of data -  SoLoMo for social, local, mobile data. Now this is what I call  &#8216;ediscovery rhyme&#8217; !</p>
<p>Does this mean that Cloud Computing is now passé?</p>
<p>To quote Paknad in the news at<a title="Font Size: increase font decrease font IBM Escalates E-Discovery Arms Race" href="http://bit.ly/mSO0Hh" target="_blank"> law.com</a>: &#8220;There&#8217;s no easy button, there&#8217;s just complex and more complex buttons.&#8221;</p>
<p>Complex buttons leading to more sore fingers and eyes ( even with predictive coding! ).</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/06/22/e-discovery-process-in-solomo/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>predictive coding technology &#8211; In the name of cost cutting or/and competition?</title>
		<link>https://jollyvip.com/edisclosure/2011/06/19/predictive-coding-technology-in-the-name-of-cost-cutting-orand-competition/</link>
		<comments>https://jollyvip.com/edisclosure/2011/06/19/predictive-coding-technology-in-the-name-of-cost-cutting-orand-competition/#comments</comments>
		<pubDate>Sun, 19 Jun 2011 18:05:58 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2011]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[predictive coding]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=241</guid>
		<description><![CDATA[The ediscovery space is no longer just driven by ediscovery vendors but also by predictive coding technology which is being heralded as a &#8216;game-changing&#8217; capability as highlighted by OrcaTec. Excellent posting by the author, Herbert L. Roitblat. Please note that I have not included the trademark symbol in this blog &#38; in the blog&#8217;s title [...]]]></description>
			<content:encoded><![CDATA[<p>The ediscovery space is no longer just driven by ediscovery vendors but also by predictive coding technology which is being heralded as a &#8216;game-changing&#8217; capability as highlighted by<a title="OrcaTec's blog" href="http://bit.ly/jHpkZ7" target="_blank"> OrcaTec.</a> Excellent posting by the author, Herbert L. Roitblat.</p>
<p>Please note that I have not included the trademark symbol in this blog &amp; in the blog&#8217;s title as I am not referring to <a title="Recommind's Blog" href="http://bit.ly/mjWTli" target="_blank">Recommind&#8217;</a>s patented  &#8216;predictive coding&#8217;.</p>
<p>Embracing technology, including predictive coding, is ultimately a game-changing  &#8216;war&#8217; (<a title="the orange rag" href="http://bit.ly/kOXi0h" target="_blank">Predictive Coding war breaks out in US ediscovery sector</a>? ).</p>
<p>Let&#8217;s hope more predictive coding technology will be deployed for cost cutting the ediscovery costs and not be locked in competition mode.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2011/06/19/predictive-coding-technology-in-the-name-of-cost-cutting-orand-competition/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
