When you make a recording of a presentation, all its elements (narration, animation, pointer movements, timings, and so on) are saved in the presentation itself. In essence, the presentation becomes a video that your audience can watch in PowerPoint.
Read the Article
How to send email to all accepted meeting attendees in Outlook. For some reason, you need to send email to all accepted meeting attendees in Outlook. Here’s how:
There are actually two primary ways of printing a document with comments. Neither one of them is very obvious.
Before you jump into determining what to do with a malicious email, there are a few general tricks you should learn to spot red flags for malicious activity. Here are five easy ways to recognize and dispose of malicious emails.
Learn more about email software
Data safety is an important concept for law firms, and for good reason. Most jurisdictions have rules for lawyers that explain the bare minimum of what they are required to do to protect client data. Email security is an important concept because it is still used to gain information (including login credentials) for critical systems. If you don’t know and use email security best practices, your data remains at risk regardless of the other data protection safeguards implemented.
Read the article
Does your court require your brief's footnotes to be the same size as the brief's main text? (By default, they're usually 2 points smaller.) Here's the quickest, most foolproof way to ensure that every footnote--present and future--meets the requirement.
Watch the video
Learn more about Microsoft Word
Learn more about Microsoft PowerPoint
In order to create a litigation document database, we need every record (document) in the database to have a unique identifier field. Here is how a Control Number differs from a Bates Number.
This fast tip demonstrates how to add another file as an attachment to a PDF file. This feature is available in Adobe Acrobat (even the Reader version) and Nuance Power PDF.
Learn more about Nuance Power PDF
Learn more about Adobe Acrobat
Over 90% of targeted cyber attacks come through email. End-user training is a major factor in the way a business can combat these attacks. Here are 5 ways you can recognize a phishing email.
National Society for Legal Technology TM is dedicated to helping students and legal professionals learn about and explore legal technology software programs.
Copyright 2023 National Society for Legal Technology