Stealth Networking | Knowledge Management

Not “stealth” as in “I don’t want you to know about it.”  More like “stealth” as in “I don’t want to bother you.”

I’ve mentioned e-mail-mining technologies, like Contact Networks, before in “Who Do We Know” and “The Zero-Percent Rule.”  Here’s a piece in KMWorld called, “Contacts and connections: an array of options” that addresses the topic.  It discusses what they’re doing over at Reed Smith.   As Tom Baldwin, Reed’s CKO states in the article, it’s important to “make use of contact information without taking any time away from our busy attorneys.”

The article has a nice description about how the systems works.  “ContactNet mines e-mail message flow to identify relationships outside the enterprise. It calculates the strength of the relationships by measuring the frequency of such messages. Users can type in the name of an individual or a company, and ContactNet brings up a list of people within the firm who have connections to the target person or organization. In addition, ContactNet provides access to a large database of public and private companies. Through that database, users can find out the standard industry code, the standing of the target individual within the company, and other information critical to understanding the context of the connection.”

Does your firm use Contact Networks or any of the similar systems, like Visible Path or BranchIT.  If so, please let us know how you like them.

LawyerKM :: Knowledge Management & Technology for Lawyers and Law Firms

Share on LinkedInTweet about this on TwitterShare on FacebookEmail this to someone
If you liked it, please share it.

Leave a Reply

Your email address will not be published. Required fields are marked *