Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Study Finds That E-Discovery Using Enterprise-Wide Search Improves Results And Reduces Costs

SAN JOSE, Calif., Aug. 10. ZL Technologies, the leader in archiving and e-discovery software for the large enterprise, has published a scientific paper in the Proceedings of the 18th NIST/Text Retrieval Conference (TREC), which details a significant gap in efficiency between traditional custodian-search and enterprise-wide search in e-discovery settings. The results demonstrate that organizations relying solely upon custodian-search are basing important legal decisions on incomplete information, which can lead to potential cost overruns and court sanctions.

ZL conducted this research using two separate evaluation teams working with the TREC Enron corpus of documents -- a volume of approximately 3,000,000 emails from more than 100 Enron employee mailboxes. The team using the custodian approach for searching the TREC documents failed to identify 84 percent of the responsive documents, and only identified four relevant custodians. In contrast, the enterprise-wide search team identified all responsive documents across 77 relevant custodians. The scope of enterprise-wide search enhances the ability of legal teams to find critical evidence that may influence legal strategy, particularly when counsel is determining whether to fight or settle a matter.

"ZL Technologies' work with TREC brings to focus the Achilles' heel of utilizing a custodian-based search for data collection and review," says William Hamilton, partner at Quarles & Brady LLP and adjunct professor at the University of Florida College of Law. "Although this methodology may reduce initial up-front costs, the price of these blind limitations is significant and often unacceptable. ZL's findings demonstrate that a broader investigative approach, relying on advanced search techniques applied across a larger relevant dataset, is a better approach for reducing costs while making sound legal decisions."

Many current technologies were not designed to execute enterprise-wide searches - resulting in slow search speed or incomplete results. In contrast, the platform used in the ZL TREC study, ZL Unified Archive, is a purpose-built archiving and e-discovery solution designed to perform instantaneous searches across billions of records. This approach to archiving and search reflects the expanding demand for electronic records management across a range of data types, and the court's increasing demands for faster and more accurate e-discovery.

"Searching custodian-by-custodian is an inherently flawed approach because it requires up-front assumptions as to which custodians are relevant to a particular matter," said Adam Sand, General Counsel of ZL Technologies. "The better approach is to conduct an enterprise-wide search across the entire volume of data to identify relevancy, regardless of custodian. This approach casts a wider net that allows the identification of relevancy more quickly and less expensively than the custodian methodology."


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers