Cisco Converges in Europe; Tech a Big Factor

Cisco Converges in Europe; Tech a Big Factor. In my estimation, Cisco’s law department is one of the most advanced, both with respect to management generally and to technology specifically. As the company adopts the “DuPont convergence model” in Europe, use of technology and processes will play a big role.  In Cisco poised for move… Continue reading Cisco Converges in Europe; Tech a Big Factor

Orrick Considers Tech Support for Other Law Firms

Orrick Considers Tech Support for Other Law Firms. I have written previously about Orrick’s centralized “Global Operations Center” (“GOC”) in Wheeling, WV. The Aug/Sep 2004 issue of Law Firm, Inc. has a good follow-up article (“Location, Location, Location”) about the GOC.  Orrick has cut annual operating expenses by $5.6 million by consolidating tech support, operations,… Continue reading Orrick Considers Tech Support for Other Law Firms

My Recent 5 by 5 Post on Legal Technology

My Recent 5 by 5 Post on Legal Technology. Matt “the [non]billable hour” Homann periodically runs a feature on his blog called “Five by Five” that features five experts answering a thought-provoking question. I recently participated with legal tech experts Ron Friedmann, Jerry Lawson, Jeff Beard and Kevin Heller in a Five by Five on… Continue reading My Recent 5 by 5 Post on Legal Technology

SP2 Testing and Migration Guide

SP2 Testing and Migration Guide. Yesterday, Microsoft published the “Application Compatibility Testing and Mitigation Guide for Windows XP Service Pack 2,” available here. I highly recommend the guide to Windows developers and any company planning to deploy SP2 (That should be every one running Windows XP). Besides documentation, the testing guide also provides scripts that… Continue reading SP2 Testing and Migration Guide

Cryptanalysis of MD5 and SHA: Time for a new standard

Cryptanalysis of MD5 and SHA: Time for a new standard. Bruce Schneier talks about the recent reported weaknesses in common hash functions such as MD5. He writes: As a user of cryptographic systems — as I assume most readers are — this news is important, but not particularly worrisome. MD5 and SHA aren't suddenly insecure.… Continue reading Cryptanalysis of MD5 and SHA: Time for a new standard