Konica Minolta's blog provides valuable insights from executives and key contributors focusing on IT and cloud services, information management, and enterprise content solutions for your industry and practice. Our unique mix of innovation and expertise provides our readers with technology solutions to help their business run more efficiently. Check back often for updates on timely industry news commentary or subscribe to our RSS feed.
I’m excited to be joined by Peter Wallqvist, Vice President of Strategy at iManage, for the second of a two-part blog series on legal document management solutions. Konica Minolta and All Covered — the IT Services Division of Konica Minolta — have a strategic partnership with iManage, which provides cutting-edge legal document management solutions. iManage recently acquired RAVN Systems, a UK-based company that developed an artificial intelligence (AI) platform that can organize, discover and summarize relevant information from large volumes of documents and unstructured data. (more…)
I’m very excited to be joined for the first of a two-part series regarding Legal Document Management Systems (DMS) by Marco Maggio, U.S. Legal Practice Director with Konica Minolta’s IT Services Division, All Covered. The Konica Minolta and All Covered Legal team have produced a combined, robust portfolio of products, services and solutions for all segments of the legal industry. However, with the variety of legal solutions to choose from, it can be a confusing proposition for legal professionals to try and decipher which one to pick. Here, Maggio talks about his ebook and offers some valuable insight on the topic. (more…)
Imagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today. In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)
My first car was a gray Pontiac Sunbird and, being that I was intrigued by manual transmissions, I had to have this feature even though I only knew how to drive an automatic. You may ask, “Why did you buy a new car that you couldn’t even drive?” Well, my rationale was that if the car was purchased, I would have to force myself to learn and face my fear. So, I bought the car and a good friend drove it home for me and, for about a month, I stared out the window trying to get up the nerve to learn how to drive it. One day, after growing tired of catching the bus, I found the nerve to learn and, of course, it wasn’t that bad. I drove that car for 13 years. Although it wasn’t new technology, it was new to me and it was a giant beast I had to conquer. (more…)
File sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely. With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)
Generating a steady stream of revenue and ensuring document security are big objectives for a business of any size to survive. But many of them – especially small businesses – neglect to adopt a comprehensive means for tracking multifunction printer (MFP) usage and recovering costs. Additionally, many businesses don’t take the necessary precautions to protect and secure files across their organization. The result? They’re tossing a bundle of valuable funds into the wind while leaving their organization open to security breaches and threats. (more…)
The world is changing. It’s a fact. Think about it, in your lifetime, you may have seen computers shrink smaller yet more powerful, phones move from rotary dial and party lines to devices that comfortably fit in your hand and hold more computing power than the computers that sent men to the moon.
What if you and your law firm haven’t kept up with the times and haven’t yet embraced the right legal technology to improve your firm’s productivity? You can bet your client has and they expect you to be not only savvy with today’s technology, but to be innovative. (more…)
Lawyers, paralegals, and other legal professionals go to work each day to address vital issues for their clients. It’s critical that law firms use innovative and advanced solutions to maximize their practice’s productivity.
That’s why we developed Dispatcher Phoenix Legal, our award-winning document workflow application. This legal records management system specifically designed to streamline the processing of case files, affidavits, subpoenas and other legal documents. Dispatcher Phoenix Legal helps our customers with the document-processing challenges that they face every day, driving efficiencies and allowing attorneys to focus on what they do best – the practice of law.
Casner & Edwards, the law firm that was highlighted in a customer success story and blog, used Dispatcher Phoenix to speed their printing process. But that’s not the only way that legal professionals can take advantage of the advanced processing features of Dispatcher Phoenix to work more quickly and accurately.
Has “The Art of Listening” become a thing of the past?
In today’s workplace, there are a tremendous amount of technological distractions. That’s evident by how much attention we get from our peers, friends or family members while engaged in a one-to-one conversation or meeting. There’s competition to be heard above the iPad, smartphone, social media sites, etc.
I grew up in a rather large family on both my maternal and paternal sides. Around the holidays, while there were many fun times and great memories, it was hard to get a word in edgewise. Thus, by default, I developed the art of listening and strategically knew the best time to ease into a conversation. Even at a young age, I studied body language, expressions and became more of an observer, which helped me to be more perceptive and to understand the uniqueness of each relative’s behavior.
When I came to Konica Minolta more than six years ago, our proprietary software, Dispatcher Phoenix, was being developed to include a legal solution. This is when my good listening skills kicked in, because I had to talk to our legal customers and listen carefully to their challenges to ascertain which features would be important to them. Some of these features included advanced document workflow solutions to automate document processing tasks, redaction, advanced OCR, and connectors to document management system, just to name a few.
Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.
These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.
IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.
Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)