Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

There is an ongoing debate in the industry around how to treat document families.  But, what is a document family?  Well, there are several kinds of families whether this is an ...
Blog Entry by Mat Beer | 19 Nov 2014 | 0 comments
When I talk to customers, one of their common challenges is to get custodians to acknowledge their Legal Hold notifications. This is even more important considering courts are ...
Blog Entry by Ash_Gupta | 11 Nov 2014 | 0 comments
Cloud-based business email and business documents are on the rise. Radicati Group estimates that nearly 40% of business email accounts will be cloud-based by 2017. 37% of ...
Blog Entry by Bashyam Anant | 04 Nov 2014 | 0 comments
Turbocharged Production | Optimized Review Organizations are facing myriad challenges presented by an ...
Blog Entry by Zachary Bosin | 06 Oct 2014 | 0 comments
Behind-the-scene architecture details, feature usage & Troubleshooting tips about Amazon S3 as secondary storage Mirgator of data in Symantec Enterprise Vault In the blog, I will ...
Blog Entry by Manoj Chanchawat | 24 Jul 2014 | 3 comments
For years, the "holy grail" for eDiscovery software providers and the companies they serve has been to provide a single solution that manages the entire eDiscovery process. Minus a few exceptions, most ...
Blog Entry by Matthew Nelson | 27 Jun 2014 | 0 comments
Rule 26 The new rules are designed to force both parties to limit the amount of documents and scope to the essential parts that each party want to address.   As these new rules are ...
Blog Entry by Jeff@CBI | 18 Jun 2014 | 0 comments
Good afternoon,  We have discovered a bug when installing the fix 1 on clearwell 7.1.4.  If you install with the standard .exe package, in a distributed architecture, you will find an error on each of the slave appliances.  They will keep ...
Blog Entry by Jeff@CBI | 17 Jun 2014 | 0 comments
As I do everyday, I receive these posts and articles about eDiscovery.  Not very often does it make me want to create an article about it and share the details of a valuable topic. As this case will describe, the best tactics are to hire an ...
Blog Entry by Jeff@CBI | 17 Jun 2014 | 0 comments
We have discovered that Windows 2003 server and Windows 2008 R2 have a bug that if your network addresses reside in the public range, such as 162, it will automatically enable IPV6.  If you go to regedit and go to local machine -->system -->current ...
Blog Entry by Jeff@CBI | 06 Jun 2014 | 0 comments