Feeds:
Posts
Comments

Archive for the ‘Cloud’ Category

Facebook has recently announced that they will start expiring access tokens after 60 days. These tokens are used for Cloud Preservation to crawl Facebook feeds that require user authorization. To ensure proper crawling of your Facebook feeds you will need to reauthorize Cloud Preservation every 60 days.

This can be done by going to the feed’s settings and selecting to either enter your Facebook credentials or emailing the user who originally authorized the feed.

After saving the changes you will either be directed to sign into Facebook or an email will be sent to the email address you entered.

As a feed owner you will be notified 5 days before tokens are scheduled to expire, and again the day they expire, if you have not already reauthorized.

While this is may be seen as a nuisance, we understand that Facebook is taking this step to improve user security and we will do our best ensure the process is as smooth as possible.

Read Full Post »

The following features are available immediately in TrialCloud and DiscoveryCloud instances.

 

Image Placeholders

When producing files that are only available as natives, it is handy to have a placeholder — something that can be bates stamped or even just “holds a spot” in the stack of paper following printing.  To fill this need, we will now add a boilerplate image (at initial processing time) when we would otherwise not have anything to display/produce.

 

 

The placeholders will be inserted for new processing requests and are not available retroactively.  The keys are in your hands as far as keeping/removing these images after processing completes and documents that are in this boat may be located via a filter for “Unsupported Filetypes Only”.

 

Working with Processing Messages

Another feature now available is the ability to remove individual error/warning messages following batch processing.

 

 

This is in addition to the ability to resolve ALL messages in 1 motion.  Removing the messages is permanent and should only be done when you are sure that the issue has been resolved adequately.

We hope you enjoy these new features!

Read Full Post »

The next time you login to your Nextpoint account, you may notice some fresh new icons.

Available to existing Nextpoint customer’s, Privilege Protect expands previous document, deposition, and transcript transferring capabilities.  New features and customizations combine to make this the most powerful and convenient document production tool available.  Official public release will be coming in September 2012.

To get started, simply search to isolate documents and select the Privilege Protect icon.

Then configure your transfer.

If the target of your transfer is a 3rd party, additional checks and balances will be made available to ensure safety and sanctity of data.
Some notable options:

  • Selecting a recipient.  Transferring to 3rd party recipients (who are existing Nextpoint clients themselves) requires a PIN be setup and communicated between the 2 parties, not only providing reassurance that you are transferring to the correct recipient, but also that the 3rd party’s privacy is protected.
  • Privilege Detection [Discovery Cloud only].  Privilege Detection compares documents you’ve elected to transfer with those that you have previously identified as privileged and/or have redacted.  A report is generated bringing potential leaks to light, allowing you to double check suspicious documents before they may have been erroneously transferred to a 3rd party.
  • Loadfile Review.  To reassure you that the data transferred will be exactly what you have anticipated – nothing more, nothing less – you are afforded the opportunity to review the actual loadfile that will be used for the transfer.  Search this file for key phrases, email addresses, or anything else that may be a red flag that an undesired document or meatadata would have otherwise been transferred.
  • “Smart Override” for native document transfer.  Blocking documents that are privileged from production is critical, but what if a native email (which is not itself marked as privileged) were transferred – containing the data necessary to re-create a privileged Word Doc that had been an attachment?  Smart override works to detect this situation and prevent transmission, instead opting to transfer images of the document in question.

Nextpoint Privilege Protect is available now to existing Nextpoint customers, allowing you to produce without ever leaving our toolset.  No harddrives to inventory and worry about going astray in the mail.  We hope you get a lot of benefit and use out of this tool and look forward to hearing your feedback.

Read Full Post »

Trial Cloud’s newest feature adds the ability to generate Deposition and Transcript PDFs with multiple pages per sheet. You can even show background highlighting on your Condensed PDFs.

Just select the issues and designations that you would like to include in your report, choose “Condensed PDF” and click “Export” and Trial Cloud will generate your pdf for you.

Pages are ordered in the pdf sheets from top to bottom, left to right.

This is an often requested feature addition and something we’re very excited to roll out to our users.

Read Full Post »

We are excited to announce new options for crawling Facebook. We have added the ability to crawl profiles anonymously, crawl friends’ profiles, and crawl age and country restricted pages. Also, in an effort to make crawling Facebook easier we have combined page and profile crawl creation.

We now offer the option to crawl a Facebook profile anonymously. This will allow you to capture a Facebook profile’s information that is available to all Facebook users. You can do this by simply entering the address of the profile you want crawled, then selecting the “Anonymous User” option for who to crawl as. Simply complete the form and we will begin crawling. If you need to capture more information than is available publicly, and are unable to get the user’s credentials, we have added an option for that also.

You now have the ability to crawl friends and other profiles as they are available to you or anyone else who is willing to authorize the use of their credentials. This can be done by entering the address of the profile you want to crawl then selecting either the “Enter Facebook credentials” or “Email other Facebook User for credentials” options and proceed with authentication. We will then begin crawling the specified profile as if we were the user who authorized the crawl.

Facebook fan pages can be restricted based on the age and country of the viewing user. You can now crawl these restricted pages by selecting to crawl the feed with Facebook credentials that have the proper permissions to view these pages. When creating the feed, select either the “Enter Facebook credentials” or “Email other Facebook User for credentials” option and proceed with authentication. Once authentication is completed we will be able to crawl the page as if we were viewing the page as the authenticated user.

In addition, you no longer need to know if you are crawling a Facebook fan page or a Facebook profile. You can create crawls for both using the same process. Simply select the “Facebook Feed” options from the “Add a New Website or Social Network Account” dropdown menu. From here you can simply enter the ID of the Facebook object you want to crawl, select who you want to crawl the object as (more on this later), then fill out the remained of the options just as before. After authorization, if it is required, we will start crawling Facebook.

We hope the streamlining of the Facebook Feed setup will save you time when setting up new feeds. And we hope these new features will allow you to capture all the Facebook information you need.

Read Full Post »

Nextpoint’s TrialCloud and DiscoveryCloud software now supports importing files directly from EnCase evidence files (E01) and Apple Disk Images (dmg) for all common disk formats — Windows XP, Windows 7, and Mac OS X.

On the import screen, you’ll now find a Disk Image import type, enabled when a valid disk image file has been selected from your S3 folder. These may be single files or multiple split-image files contained in a zip. When this option is used, the uploaded hard drive will be extracted in place and the files it contains will be imported directly from the image as though they’d been opened and imported separately.

Disk Image Upload

At import time, a specific set of files and directories to import may be defined in order to narrow the scope of the uploaded data and avoid processing large amounts of uninteresting documents. Additionally, for disk formats that support it, you may choose to include or exclude system files (those bundled with the operating system itself rather than created by a user, potentially uninteresting during review) and hidden files (most often application preferences and filesystem metadata).

These options, in combination with our DeNIST file filtering feature, allow you to focus in on the important documents from your collected evidence files quickly and easily.

Read Full Post »

Document search results are normally displayed by one of two means: (1) Relevance – The document matches your search criteria, but how does it “score” compared to other documents that match? (2) Order that you explicitly specified.  In many situations, this makes the most sense, but sometimes you want to view document families (i.e. email’s with their attachments) together.  One way that we provide this capability is via “Group document families” (on the “Documents” page for TrialCloud; “Review” page for DiscoveryCloud).  Selecting this option will group members of the same family together in the search results.

Central to understanding the feature is an understanding of how Nextpoint defines a “document family”.  While we believe that an email and it’s attachment are two separate but highly-related documents… we also believe that for features such as de-duplification it’s important to have knowledge of the context of an individual document.  Therefore, a document’s “family” is considered to be anything that would typically be expected to be transmitted in a “single package”.  For example, an email physically contains the bytes necessary to piece together an attached file — they’re “in a family”.  A zip file contains the bytes necessary to re-assemble it’s contents: they’re in a family.  A reply to an email does not contain all of the bytes necessary to recreate a true representation of the email it replies to: they’re not in a family.

Are two identical documents considered to be “in a family”?  Only if their entire family’s are identical.  This most frequently happens when the same document is uploaded multiple-times by-itself , although it will also occur when the exact same email file (with an attached document) is uploaded more than once.  Note: Each of these situations is blocked if deduplification is enabled.

The results of the search display document families grouped together and separated by white space.  In this example, 2 families are shown: each comprised of a single email and their single attachment.

This feature does not pull any documents into your results that did not match your query, but instead does exactly what is promised: group the results of your search.  For example, a hit in an attached Word document would not lead to the Email that attaches it being included in the set, unless the email itself also matched the search criteria.  Should you require the capability to pull in related (non-matching) documents, options are available via “Bulk Actions” to accomplish that goal.

Similar to any other sorting option with document search:  The order documents are displayed on screen may be relied on to be the same order than any Bulk Actions (including Bates Assignment, etc) will be carried out.

Read Full Post »

« Newer Posts - Older Posts »