Blog
LegalTech New York 2013
It's hard to believe that LegalTech New York is upon us again. Pinpoint Labs will have representatives in New York next week, 28th – 31st , and we wanted to invite you to attend one of our sessions at the Sheraton Hotel if you will be in town. Here is the information...
Microsoft SharePoint Forensic and E-Discovery Collections
SHAREPOINT FORENSIC AND E-DISCOVERY COLLECTIONS Microsoft SharePoint forensic and E-Discovery collections have become a growing concern for legal IT professionals and their clients. An extensive amount of potentially relevant discoverable content stored in SharePoint...
Mac Target Disk Mode
Booting an Apple Macintosh in target disk mode allows computer forensic examiners to copy relevant files from the internal drive on a Mac computer. Removing hard drives instead from a Mac computer can be time-consuming and damage the system when not performed...
SafeCopy 3.0: Fast Multi-Threaded Copy Tool from Pinpoint Labs
What is multi-threaded copying and why is it important? When a large number of computer files need to be copied from their current location to a network or external hard drive, the process could take many hours or even days. For example during a civil litigation case,...
What is deNISTing?
Saving clients money on electronic discovery processing is one of the challenges facing attorneys, service bureaus and their clients. Due to the amount of data collected when imaging custodian hard drives the resulting processing and labor costs can be significant and...
ESI Self Collection Drives and Kits
Electronically Stored Information (ESI) self-collection drives and kits have become popular in the last few years because they offer an affordable means of collecting electronic data for a legal matter without the need to hire an expensive forensic expert. This...
What is a Hash Value?
A hash value results from a calculation (hash algorithm) that can be performed on a string of text, electronic file, or entire hard drive contents. The result is also called a checksum, hash code, or hashes. Hash values are used to identify and filter duplicate files...
E-Discovery Collection
E-Discovery Collections also known as Electronic Evidence Discovery (EED) or Electronic Data Discovery (EDD) can include a review of all the data stored on employee desktop or laptop computers, company servers, camera cards, cell phones, smart phones, GPS devices,...
How Much is a Petabyte, Exabyte, or Zettabyte?
As our electronically stored information (ESI) data universe continues to grow, we are hearing about increasing storage capacities. The size of a project in terabytes (TB - 1024 Gigabytes) comes up frequently and is often the amount of data that has to be collected,...
Email Collection
Email Collection refers to the identification and isolation of electronic mail (email) messages that pertain to a specific legal matter in civil litigation cases. What gets collected What is actually being collected during email collections can be one of two things:...
Get in Touch with Us
Schedule a FREE demonstration or ask any question. We’d be happy to help.