{"id":31616,"date":"2019-05-16T03:54:36","date_gmt":"2019-05-16T07:54:36","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31616"},"modified":"2019-05-16T03:54:36","modified_gmt":"2019-05-16T07:54:36","slug":"legal-workflow-automation-use-cases-customization-must-come-first","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/16\/legal-workflow-automation-use-cases-customization-must-come-first\/","title":{"rendered":"Legal Workflow Automation Use Cases: Customization Must Come First"},"content":{"rendered":"\n<p> <br>by\u00a0<a href=\"https:\/\/www.jdsupra.com\/profile\/mitratech_holdings_inc_docs\/\">Mitratech Holdings, Inc<\/a> &#8211; Legal automation can be disruptively&nbsp;<em>beneficial<\/em>&nbsp;or disruptively&nbsp;<em>disastrous<\/em>&nbsp;for legal departments. One factor that makes the difference?&nbsp; Whether or not an automation product empowers users to craft their own solutions.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/05\/binding-contract-948442__340.jpg\" alt=\"\" class=\"wp-image-31617\" width=\"274\" height=\"175\"\/><\/figure><\/div>\n\n\n\n<p>Whether for process automation, predictive analytics, e-billing, any legal automation solution&nbsp;<em>only<\/em>&nbsp;succeeds when user needs and user experiences come first.&nbsp; In his book&nbsp;<em><a href=\"https:\/\/www.amazon.com\/Dreaming-Code-Programmers-Transcendent-Software\/dp\/1400082471\" rel=\"noreferrer noopener\" target=\"_blank\">Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software<\/a><\/em>, Scott Rosenberg coined a meme-worthy quote about the role of software development in driving disruption:&nbsp;<em><strong>\u201cThe revolution has to be customised.\u201d<\/strong><\/em><\/p>\n\n\n\n<p>This was in the pre-SaaS era, and he was writing about the work of programmers and software architects, not end users. But the point still holds today, as does another observation he offered:<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong><em>\u201cSoftware is easy to make, except when you want it to do something new. And then, of course, there is a corollary: The only software that\u2019s worth making is software that does something new.\u201d<\/em><\/strong>  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.jdsupra.com\/legalnews\/legal-workflow-automation-use-cases-85031\/&amp;ct=ga&amp;cd=CAEYACoTNTM3MzgzMzM2NTA2MDg0MjQ1NzIaNGFjOTI3ZjdkYTNiM2I1YTpjb206ZW46VVM&amp;usg=AFQjCNHgkHbiAxW8W8Sr51HDwZC07TadYg\"><em>Read more: <\/em><\/a><\/h6>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by\u00a0Mitratech Holdings, Inc &#8211; Legal automation can be disruptively&nbsp;beneficial&nbsp;or disruptively&nbsp;disastrous&nbsp;for legal departments. One factor that makes the difference?&nbsp; Whether or not an automation product empowers users to craft their own solutions. Whether for process automation, predictive analytics, e-billing, any legal <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/16\/legal-workflow-automation-use-cases-customization-must-come-first\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[53],"tags":[179],"class_list":["post-31616","post","type-post","status-publish","format-standard","hentry","category-workflow","tag-workflow"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31616"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31616\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}